Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1562274
MD5:da7a7d753dee0257505654e753e7adea
SHA1:8b7f1ea501592bd3f6bed17ca62cba63a8994b4e
SHA256:7ecf97ea56c6f1f39674123ccede879e5482470477abe7947f1dbb7dcc83efdf
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 4764 cmdline: "C:\Users\user\Desktop\file.exe" MD5: DA7A7D753DEE0257505654E753E7ADEA)
    • taskkill.exe (PID: 4128 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 3840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 6400 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 5300 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 5296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 6608 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 1164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7056 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 2820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 7092 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 4956 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 2752 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 2800 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {647ccd71-570b-4ec6-9efb-49c2bc0fae2b} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b434a6dd10 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7524 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4492 -parentBuildID 20230927232528 -prefsHandle 4484 -prefMapHandle 4480 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69ecc336-1658-46c0-bf13-e6d8ee36fde7} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b44571ce10 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7956 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5060 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b99be95-6a32-4891-a374-7f066e98cf3f} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b446b75b10 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 4764JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 28%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.8% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49715 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49717 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49724 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49727 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49737 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49736 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49747 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49750 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49791 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49792 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.65.91:443 -> 192.168.2.5:49794 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49803 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49802 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49800 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49804 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49868 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49869 version: TLS 1.2
    Source: Binary string: webauthn.pdb source: firefox.exe, 0000000E.00000003.2194715379.000002B450BC1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.14.dr
    Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 0000000E.00000003.2231503323.000002B4421C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wshbth.pdb source: firefox.exe, 0000000E.00000003.2231503323.000002B4421C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000E.00000003.2231116039.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000E.00000003.2230031110.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.14.dr
    Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000E.00000003.2194715379.000002B450BC1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000E.00000003.2231116039.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000E.00000003.2230031110.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CC2A2 FindFirstFileExW,0_2_007CC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
    Source: firefox.exeMemory has grown: Private usage: 1MB later: 219MB
    Source: unknownNetwork traffic detected: DNS query count 31
    Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
    Source: Joe Sandbox ViewIP Address: 151.101.65.91 151.101.65.91
    Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
    Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
    Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0080CE44
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: firefox.exe, 0000000E.00000003.2171751527.000002B446BD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2316801081.000002B44435F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: -l10n-id="newtab-menu-content-tooltip" data-l10n-args="{&quot;title&quot;:&quot;Wikipedia&quot;}" class="context-menu-button icon"></button></div><div class="topsite-impression-observer"></div></div></li><li class="top-site-outer"><div class="top-site-inner"><a class="top-site-button" href="https://www.reddit.com/" tabindex="0" draggable="true" data-is-sponsored-link="false"><div class="tile" aria-hidden="true"><div class="icon-wrapper" data-fallback="R"><div class="top-site-icon rich-icon" style="background-image:url(chrome://activity-stream/content/data/content/tippytop/images/reddit-com@2x.png)"></div></div></div><div class="title"><span dir="auto">Reddit<span class="sponsored-label" data-l10n-id="newtab-topsite-sponsored"></span></span></div></a><div><button aria-haspopup="true" data-l10n-id="newtab-menu-content-tooltip" data-l10n-args="{&quot;title&quot;:&quot;Reddit&quot;}" class="context-menu-button icon"></button></div><div class="topsite-impression-observer"></div></div></li><li class="top-site-outer hide-for-narrow"><div class="top-site-inner"><a class="top-site-button" href="https://twitter.com/" tabindex="0" draggable="true" data-is-sponsored-link="false"><div class="tile" aria-hidden="true"><div class="icon-wrapper" data-fallback="T"><div class="top-site-icon rich-icon" style="background-image:url(chrome://activity-stream/content/data/content/tippytop/images/twitter-com@2x.png)"></div></div></div><div class="title"><span dir="auto">Twitter<span class="sponsored-label" data-l10n-id="newtab-topsite-sponsored"></span></span></div></a><div><button aria-haspopup="true" data-l10n-id="newtab-menu-content-tooltip" data-l10n-args="{&quot;title&quot;:&quot;Twitter&quot;}" class="context-menu-button icon"></button></div><div class="topsite-impression-observer"></div></div></li><li class="top-site-outer placeholder hide-for-narrow"><div class="top-site-inner"><a class="top-site-button" tabindex="0" draggable="true" data-is-sponsored-link="false"><div class="tile" aria-hidden="true"><div class="icon-wrapper"><div class=""></div></div></div><div class="title"><span dir="auto"><br/><span class="sponsored-label" data-l10n-id="newtab-topsite-sponsored"></span></span></div></a><button aria-haspopup="dialog" class="context-menu-button edit-button icon" data-l10n-id="newtab-menu-topsites-placeholder-tooltip"></button><div class="topsite-impression-observer"></div></div></li></ul><div class="edit-topsites-wrapper"></div></div></section></div></div></div></div><style data-styles="[[null]]"></style></div><div class="discovery-stream ds-layout"><div class="ds-column ds-column-12"><div class="ds-column-grid"><div></div></div></div><style data-styles="[[null]]"></style></div></div></main></div></div> equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240623382.000002B4503C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2328268674.000002B4503F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2328106241.000002B450751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2284331721.000002B44CED9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2284331721.000002B44CED9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240623382.000002B4503C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2303942515.000002B44689C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2328106241.000002B450751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2307697408.000002B44649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2307697408.000002B44649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2284331721.000002B44CED9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2284331721.000002B44CED9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2332691298.000002B44C874000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2332691298.000002B44C874000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000E.00000003.2332691298.000002B44C874000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2332691298.000002B44C874000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/8 equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2332691298.000002B44C874000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/8 equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000E.00000003.2332691298.000002B44C874000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/8 equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.twitter.com (Twitter)
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2240219569.000002B450697000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2297333753.000002B45069C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://bfdd6cf3-6cd6-4fa2-bc72-2c3d2e7d20f8/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240623382.000002B4503C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000E.00000003.2328106241.000002B450751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000E.00000003.2310284139.000002B4460C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2284331721.000002B44CEDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2310284139.000002B4460A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
    Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
    Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: example.org
    Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
    Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
    Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
    Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
    Source: global trafficDNS traffic detected: DNS query: www.reddit.com
    Source: global trafficDNS traffic detected: DNS query: twitter.com
    Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
    Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
    Source: firefox.exe, 0000000E.00000003.2292602245.000002B44C788000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
    Source: firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
    Source: firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
    Source: firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
    Source: firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2196507595.000002B44219F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: firefox.exe, 0000000E.00000003.2200766151.000002B442186000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2231189612.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230130844.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230602690.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2199687626.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2201540601.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2226572078.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2200165072.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232431821.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229228568.000002B44217B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: firefox.exe, 0000000E.00000003.2200766151.000002B442186000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2231189612.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230130844.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230602690.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2199687626.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2201540601.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2226572078.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2194987947.000002B4421A5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2200165072.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232431821.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2198528045.000002B44217A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229228568.000002B44217B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%ss
    Source: firefox.exe, 0000000E.00000003.2193755446.000002B44219B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2193202309.000002B44218E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: firefox.exe, 0000000E.00000003.2200766151.000002B442186000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2231189612.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230130844.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230602690.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2199687626.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2201540601.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2226572078.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2200165072.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232431821.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229228568.000002B44217B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2196507595.000002B44219F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: firefox.exe, 0000000E.00000003.2200766151.000002B442186000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2231189612.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230130844.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230602690.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2199687626.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2201540601.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2226572078.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2194987947.000002B4421A5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2200165072.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232431821.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2198528045.000002B44217A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229228568.000002B44217B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2196507595.000002B44219F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
    Source: firefox.exe, 0000000E.00000003.2302586428.000002B446BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/
    Source: firefox.exe, 0000000E.00000003.2292134746.000002B44C7D5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290311578.000002B450970000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240065053.000002B450970000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306200989.000002B44C85C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
    Source: firefox.exe, 0000000E.00000003.2326507630.000002B4508FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
    Source: firefox.exe, 0000000E.00000003.2326507630.000002B4508FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
    Source: firefox.exe, 0000000E.00000003.2239115706.000002B4514DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv60
    Source: firefox.exe, 0000000E.00000003.2192039854.000002B43B868000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2193400717.000002B43B868000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2192155014.000002B43B86A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2192637081.000002B43B86B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2191231752.000002B43B869000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
    Source: firefox.exe, 0000000E.00000003.2255663677.000002B446944000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.o
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2256329693.000002B4466C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
    Source: firefox.exe, 0000000E.00000003.2317049010.000002B442441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/
    Source: firefox.exe, 0000000E.00000003.2241558282.000002B44C9E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2144403748.000002B4450C6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2255138741.000002B4450C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2317049010.000002B44244C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2293551860.000002B442B66000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257606640.000002B446D45000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2285980113.000002B44C968000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2314399836.000002B4457A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2311235999.000002B4458E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C9A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2315549476.000002B445145000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2301761978.000002B44815F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2144403748.000002B4450E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2276646089.000002B448157000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249797737.000002B4447F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2142998269.000002B445A28000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CAB4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2288873338.000002B446E11000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241886174.000002B44C957000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2295080503.000002B445A30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2281175923.000002B445A26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: firefox.exe, 0000000E.00000003.2200766151.000002B442186000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2231189612.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230130844.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230602690.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2199687626.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2201540601.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2226572078.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2196507595.000002B44219F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2200165072.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232431821.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229228568.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: firefox.exe, 0000000E.00000003.2200766151.000002B442186000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2231189612.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230130844.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230602690.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2199687626.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2201540601.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2226572078.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2194987947.000002B4421A5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2200165072.000002B442185000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232431821.000002B44217B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2198528045.000002B44217A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229228568.000002B44217B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ocsp.thawte.com0
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://poczta.interia.pl/mh/?mailto=%sw
    Source: firefox.exe, 0000000E.00000003.2171339305.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0W
    Source: firefox.exe, 0000000E.00000003.2171339305.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://win.mail.ru/cgi-bin/sentmsg?mailto=%sy
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.inbox.lv/rfc2368/?value=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.inbox.lv/rfc2368/?value=%su
    Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://www.mozilla.com0
    Source: firefox.exe, 0000000E.00000003.2325981079.000002B448DBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
    Source: firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
    Source: firefox.exe, 0000000E.00000003.2317049010.000002B44244C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2315549476.000002B445145000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2295976631.000002B45143F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2315791345.000002B445124000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2311599270.000002B4458A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
    Source: firefox.exe, 0000000E.00000003.2311599270.000002B4458A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul8
    Source: firefox.exe, 00000011.00000003.2158607190.000001D11EBFD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3360486907.000001D11EBFD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000003.2154683493.000001D11EBFD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000003.2155687220.000001D11EBFD000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.14.drString found in binary or memory: http://www.videolan.org/x264.html
    Source: firefox.exe, 0000000E.00000003.2171339305.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
    Source: firefox.exe, 0000000E.00000003.2171339305.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
    Source: firefox.exe, 0000000E.00000003.2285149330.000002B44CDF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
    Source: firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
    Source: firefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C8D4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
    Source: firefox.exe, 0000000E.00000003.2158244889.000002B4473EF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2336738226.000002B4473EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
    Source: firefox.exe, 0000000E.00000003.2242042947.000002B44C923000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268833828.000002B447761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
    Source: firefox.exe, 0000000E.00000003.2304415573.000002B44682D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
    Source: firefox.exe, 0000000E.00000003.2310284139.000002B4460C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2310284139.000002B4460A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171751527.000002B446BD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
    Source: firefox.exe, 0000000E.00000003.2290682768.000002B44CE4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amazon.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
    Source: firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/a8bxj8j?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
    Source: firefox.exe, 0000000E.00000003.2240883449.000002B45035E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2292602245.000002B44C788000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2297595056.000002B45035B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2332105139.000002B44CD0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
    Source: firefox.exe, 0000000E.00000003.2290470632.000002B45020B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
    Source: firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
    Source: firefox.exe, 0000000E.00000003.2179542558.000002B445EB9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
    Source: firefox.exe, 0000000E.00000003.2179510649.000002B445EBB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
    Source: firefox.exe, 0000000E.00000003.2180017444.000002B445EAC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2181039845.000002B445EAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2180067363.000002B445E97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
    Source: firefox.exe, 0000000E.00000003.2181039845.000002B445EAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179941760.000002B445E7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
    Source: firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179542558.000002B445EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
    Source: firefox.exe, 0000000E.00000003.2179510649.000002B445EBB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E85000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
    Source: firefox.exe, 0000000E.00000003.2288909287.000002B446A7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
    Source: firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179542558.000002B445EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
    Source: firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=793869
    Source: firefox.exe, 0000000E.00000003.2181039845.000002B445EAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2180067363.000002B445E97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
    Source: firefox.exe, 0000000E.00000003.2181039845.000002B445EAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179941760.000002B445E7B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
    Source: firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135997717.000002B442B8A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
    Source: firefox.exe, 0000000E.00000003.2307817520.000002B446487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net
    Source: firefox.exe, 0000000E.00000003.2332105139.000002B44CD0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
    Source: firefox.exe, 0000000E.00000003.2332046112.000002B44CD16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
    Source: firefox.exe, 0000000E.00000003.2332046112.000002B44CD16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
    Source: firefox.exe, 0000000E.00000003.2314940985.000002B4453F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154015259.000002B44CA35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
    Source: firefox.exe, 0000000E.00000003.2181679689.000002B445E92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2338329100.000002B446FBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2278673346.000002B446FAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2292680602.000002B4471B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000E.00000003.2350862863.000002B446A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154015259.000002B44CA35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
    Source: firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257606640.000002B446D0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
    Source: firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?t=ffab&q=
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%sz
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%szw
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329738977.000002B44EE62000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3355582123.00000208D3213000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
    Source: firefox.exe, 0000000E.00000003.2174358776.000002B446D79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2161460880.000002B446706000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2159515345.000002B446709000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2161441513.000002B446717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
    Source: firefox.exe, 0000000E.00000003.2328671490.000002B45038F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240623382.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240065053.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290311578.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2328268674.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2283690331.000002B450961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329738977.000002B44EE62000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3355582123.00000208D3213000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D32C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D32C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
    Source: firefox.exe, 00000011.00000002.3354398647.000001D11DF2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3355582123.00000208D3230000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D32C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
    Source: firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D32C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154015259.000002B44CA35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
    Source: firefox.exe, 0000000E.00000003.2264978651.000002B44CA7C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154811481.000002B44CA85000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA75000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154380582.000002B44CA85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
    Source: firefox.exe, 0000000E.00000003.2264978651.000002B44CA7C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154811481.000002B44CA85000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA75000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154380582.000002B44CA85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
    Source: firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2328268674.000002B4503CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2324738536.000002B44C8A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
    Source: firefox.exe, 0000000E.00000003.2181679689.000002B445E92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2278673346.000002B446FAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2177052707.000002B44770F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
    Source: firefox.exe, 0000000E.00000003.2278933651.000002B446F35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
    Source: prefs-1.js.14.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
    Source: firefox.exe, 0000000E.00000003.2326507630.000002B4508FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D32F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
    Source: firefox.exe, 0000000E.00000003.2292680602.000002B44713F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2297595056.000002B45035B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/811fa8d5-3e73-41fe-a41f-74de8
    Source: firefox.exe, 0000000E.00000003.2326507630.000002B4508D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/c1fe8ed2-5b1d-4ee5-8170-77d5
    Source: firefox.exe, 0000000E.00000003.2240065053.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290311578.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2283690331.000002B450961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/90e78ad4-8dbb-4231
    Source: firefox.exe, 0000000E.00000003.2240065053.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290311578.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2283690331.000002B450961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/a760bad5-f129-430e
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
    Source: firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
    Source: firefox.exe, 0000000E.00000003.2315549476.000002B4451C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com
    Source: firefox.exe, 0000000E.00000003.2314940985.000002B4453F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
    Source: firefox.exe, 0000000E.00000003.2314940985.000002B4453D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
    Source: firefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: firefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
    Source: firefox.exe, 0000000E.00000003.2181679689.000002B445E92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2302314739.000002B4471B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306359878.000002B4471A0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2337883164.000002B4471B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2292680602.000002B4471B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%sv
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%st
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D328E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
    Source: firefox.exe, 0000000E.00000003.2316801081.000002B44438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2198528045.000002B44217A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
    Source: firefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%sx
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
    Source: firefox.exe, 0000000E.00000003.2316801081.000002B44438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com/
    Source: firefox.exe, 0000000E.00000003.2317049010.000002B44244C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
    Source: firefox.exe, 0000000E.00000003.2324623500.000002B44C8E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
    Source: firefox.exe, 0000000E.00000003.2324738536.000002B44C8A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
    Source: firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
    Source: firefox.exe, 0000000E.00000003.2278788844.000002B446F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
    Source: firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
    Source: firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
    Source: firefox.exe, 0000000E.00000003.2316801081.000002B44438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com
    Source: firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
    Source: firefox.exe, 0000000E.00000003.2350862863.000002B446A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
    Source: firefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
    Source: firefox.exe, 0000000E.00000003.2278673346.000002B446FCA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306535721.000002B446FCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
    Source: firefox.exe, 0000000E.00000003.2306497736.000002B447125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000E.00000003.2278788844.000002B446F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000E.00000003.2278788844.000002B446F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000E.00000003.2278788844.000002B446F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
    Source: firefox.exe, 0000000E.00000003.2324566328.000002B44CD25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
    Source: firefox.exe, 0000000E.00000003.2303592186.000002B4468E7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3355582123.00000208D3213000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
    Source: firefox.exe, 0000000E.00000003.2303592186.000002B4468E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D32F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
    Source: firefox.exe, 0000000E.00000003.2171751527.000002B446BD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
    Source: firefox.exe, 0000000E.00000003.2310284139.000002B4460C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2310284139.000002B4460A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171751527.000002B446BD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
    Source: firefox.exe, 0000000E.00000003.2314940985.000002B4453CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2316801081.000002B44438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B450386000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2328671490.000002B45038F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2337597176.000002B4473A9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2292680602.000002B44713F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
    Source: firefox.exe, 0000000E.00000003.2279016666.000002B446F2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2293040349.000002B446F2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
    Source: firefox.exe, 0000000E.00000003.2283637687.000002B4509F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2315391068.000002B4451E7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290027576.000002B4509F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240065053.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2239327068.000002B4509F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290311578.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2308595757.000002B4463FA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2283690331.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
    Source: firefox.exe, 0000000E.00000003.2246857650.000002B4482E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
    Source: firefox.exe, 0000000E.00000003.2334621076.000002B4474DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2277396057.000002B4474C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157525785.000002B4474C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
    Source: firefox.exe, 0000000E.00000003.2316556802.000002B4443EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://truecolors.firefox.com
    Source: firefox.exe, 0000000E.00000003.2283481143.000002B45148D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
    Source: firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
    Source: firefox.exe, 0000000E.00000003.2303624191.000002B4468DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
    Source: firefox.exe, 0000000E.00000003.2300844775.000002B44C88A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2324738536.000002B44C8A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306024868.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
    Source: firefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154015259.000002B44CA35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
    Source: firefox.exe, 0000000E.00000003.2242042947.000002B44C91F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
    Source: firefox.exe, 0000000E.00000003.2290682768.000002B44CE35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257606640.000002B446D0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
    Source: firefox.exe, 0000000E.00000003.2307697408.000002B44649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
    Source: firefox.exe, 0000000E.00000003.2307697408.000002B44649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
    Source: firefox.exe, 0000000E.00000003.2195218740.000002B44219D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2196507595.000002B44219F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2195084070.000002B442179000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: firefox.exe, 0000000E.00000003.2307697408.000002B44649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.de/
    Source: firefox.exe, 0000000E.00000003.2290682768.000002B44CE14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
    Source: firefox.exe, 0000000E.00000003.2241702294.000002B44C995000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
    Source: firefox.exe, 0000000E.00000003.2155485208.000002B44CC3D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154594314.000002B44CAF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
    Source: firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135997717.000002B442B8A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
    Source: firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135997717.000002B442B8A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257606640.000002B446D0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
    Source: firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mobilesuica.com/
    Source: firefox.exe, 0000000E.00000003.2314940985.000002B4453CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2330090999.000002B44CE42000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290682768.000002B44CE2B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2330645313.000002B44CE2B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290682768.000002B44CE42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
    Source: firefox.exe, 0000000E.00000003.2161460880.000002B446706000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2159515345.000002B446709000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2161441513.000002B446717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
    Source: firefox.exe, 0000000E.00000003.2290470632.000002B45020B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/anything/?
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
    Source: firefox.exe, 0000000E.00000003.2279016666.000002B446F2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2293040349.000002B446F2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
    Source: firefox.exe, 0000000E.00000003.2240828730.000002B45037A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.14.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
    Source: firefox.exe, 0000000E.00000003.2279016666.000002B446F2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2293040349.000002B446F2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
    Source: firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/mobile/get-app/?utm_medium=firefox-desktop&utm_source=onboarding-mod
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
    Source: firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3355582123.00000208D32F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
    Source: firefox.exe, 0000000E.00000003.2327234573.000002B45075B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
    Source: firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000E.00000003.2300304392.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241075945.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2305963969.000002B44CBAF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
    Source: firefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
    Source: firefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306024868.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
    Source: firefox.exe, 0000000E.00000003.2157360220.000002B44CBA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
    Source: firefox.exe, 0000000E.00000003.2303624191.000002B4468DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2328268674.000002B4503F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
    Source: firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
    Source: firefox.exe, 00000012.00000002.3355582123.00000208D320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: firefox.exe, 0000000E.00000003.2241613776.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306024868.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
    Source: firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
    Source: firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
    Source: recovery.jsonlz4.tmp.14.drString found in binary or memory: https://youtube.com/account?=
    Source: firefox.exe, 00000012.00000002.3358997113.00000208D33D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.co
    Source: firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2223020916.000002B45124D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3355049783.0000019AD105A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3356238424.0000019AD10F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3355049783.0000019AD1050000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3353387161.000001D11DD6A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3357574180.000001D11E004000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3354754834.00000208D2FF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3358997113.00000208D33D4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3354754834.00000208D2FFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000C.00000002.2122482380.000001D398A37000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000002.2128474491.000002959A45F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
    Source: file.exe, 00000000.00000002.2154416667.0000000001200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd041.111
    Source: firefox.exe, 00000011.00000002.3353387161.000001D11DD6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdF
    Source: firefox.exe, 00000010.00000002.3356238424.0000019AD10F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3355049783.0000019AD1050000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3357574180.000001D11E004000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3353387161.000001D11DD60000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3354754834.00000208D2FF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3358997113.00000208D33D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
    Source: firefox.exe, 00000011.00000002.3353387161.000001D11DD60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdR
    Source: firefox.exe, 00000010.00000002.3355049783.0000019AD105A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdoD
    Source: firefox.exe, 0000000E.00000003.2295976631.000002B451434000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdp
    Source: firefox.exe, 00000010.00000002.3356238424.0000019AD10F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.cov
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
    Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
    Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49715 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49717 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49724 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49727 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49737 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49736 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49747 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49750 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49791 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49792 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.65.91:443 -> 192.168.2.5:49794 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49803 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49802 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49800 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49804 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49868 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49869 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0080ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_007FAA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00829576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_21083275-4
    Source: file.exe, 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_45121fbc-b
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_777069f0-7
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f1439433-2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E618E37 NtQuerySystemInformation,17_2_000001D11E618E37
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E6396F2 NtQuerySystemInformation,17_2_000001D11E6396F2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_007FD5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007FE8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007980600_2_00798060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008020460_2_00802046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F82980_2_007F8298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CE4FF0_2_007CE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C676B0_2_007C676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008248730_2_00824873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0079CAF00_2_0079CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007BCAA00_2_007BCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ACC390_2_007ACC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C6DD90_2_007C6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AB1190_2_007AB119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007991C00_2_007991C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B13940_2_007B1394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B17060_2_007B1706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B781B0_2_007B781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A997D0_2_007A997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007979200_2_00797920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B19B00_2_007B19B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B7A4A0_2_007B7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B1C770_2_007B1C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B7CA70_2_007B7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C9EEE0_2_007C9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081BE440_2_0081BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B1F320_2_007B1F32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E618E3717_2_000001D11E618E37
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E6396F217_2_000001D11E6396F2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E63973217_2_000001D11E639732
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E639E1C17_2_000001D11E639E1C
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007B0A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007AF9F2 appears 40 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00799CB3 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@34/34@66/12
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008037B5 GetLastError,FormatMessageW,0_2_008037B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F10BF AdjustTokenPrivileges,CloseHandle,0_2_007F10BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007F16C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008051CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007FD4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0080648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007942A2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3840:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1164:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2820:120:WilError_03
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: firefox.exe, 0000000E.00000003.2317049010.000002B44244C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
    Source: firefox.exe, 0000000E.00000003.2240623382.000002B4503C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;
    Source: file.exeReversingLabs: Detection: 28%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
    Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {647ccd71-570b-4ec6-9efb-49c2bc0fae2b} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b434a6dd10 socket
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4492 -parentBuildID 20230927232528 -prefsHandle 4484 -prefMapHandle 4480 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69ecc336-1658-46c0-bf13-e6d8ee36fde7} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b44571ce10 rdd
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5060 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b99be95-6a32-4891-a374-7f066e98cf3f} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b446b75b10 utility
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {647ccd71-570b-4ec6-9efb-49c2bc0fae2b} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b434a6dd10 socketJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4492 -parentBuildID 20230927232528 -prefsHandle 4484 -prefMapHandle 4480 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69ecc336-1658-46c0-bf13-e6d8ee36fde7} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b44571ce10 rddJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5060 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b99be95-6a32-4891-a374-7f066e98cf3f} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b446b75b10 utilityJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: webauthn.pdb source: firefox.exe, 0000000E.00000003.2194715379.000002B450BC1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.14.dr
    Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 0000000E.00000003.2231503323.000002B4421C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wshbth.pdb source: firefox.exe, 0000000E.00000003.2231503323.000002B4421C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000E.00000003.2231116039.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000E.00000003.2230031110.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.14.dr
    Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000E.00000003.2194715379.000002B450BC1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000E.00000003.2231116039.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000E.00000003.2230031110.000002B4421BD000.00000004.00000020.00020000.00000000.sdmp
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: gmpopenh264.dll.tmp.14.drStatic PE information: section name: .rodata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0A76 push ecx; ret 0_2_007B0A89
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007AF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00821C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00821C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96654
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E618E37 rdtsc 17_2_000001D11E618E37
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CC2A2 FindFirstFileExW,0_2_007CC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: firefox.exe, 00000010.00000002.3360439848.0000019AD1500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
    Source: firefox.exe, 00000012.00000002.3354754834.00000208D2FFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>>
    Source: firefox.exe, 00000010.00000002.3355049783.0000019AD105A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWBb1
    Source: firefox.exe, 00000010.00000002.3360439848.0000019AD1500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
    Source: firefox.exe, 00000010.00000002.3355049783.0000019AD105A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3353387161.000001D11DD6A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3358278661.000001D11E4A0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359355097.00000208D33E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: firefox.exe, 00000010.00000002.3359204816.0000019AD141D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
    Source: firefox.exe, 00000010.00000002.3360439848.0000019AD1500000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3358278661.000001D11E4A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_000001D11E618E37 rdtsc 17_2_000001D11E618E37
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAA2 BlockInput,0_2_0080EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B4CE8 mov eax, dword ptr fs:[00000030h]0_2_007B4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007B083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B09D5 SetUnhandledExceptionFilter,0_2_007B09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007B0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007D2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FB226 SendInput,keybd_event,0_2_007FB226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008122DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007F1663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0698 cpuid 0_2_007B0698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00808195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00808195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ED27A GetUserNameW,0_2_007ED27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_007CB952
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 4764, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 4764, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00811204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00811806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    12
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
    Valid Accounts
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    Extra Window Memory Injection
    LSA Secrets131
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Process Injection
    1
    Masquerading
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Valid Accounts
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562274 Sample: file.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 233 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 142.250.181.142, 443, 49711, 49712 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49713, 49719, 49723 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe29%ReversingLabsWin32.Trojan.AutoitInject
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    example.org
    93.184.215.14
    truefalse
      high
      star-mini.c10r.facebook.com
      157.240.196.35
      truefalse
        high
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalse
          high
          prod.balrog.prod.cloudops.mozgcp.net
          35.244.181.201
          truefalse
            high
            twitter.com
            104.244.42.193
            truefalse
              high
              prod.detectportal.prod.cloudops.mozgcp.net
              34.107.221.82
              truefalse
                high
                services.addons.mozilla.org
                151.101.65.91
                truefalse
                  high
                  dyna.wikimedia.org
                  185.15.58.224
                  truefalse
                    high
                    prod.remote-settings.prod.webservices.mozgcp.net
                    34.149.100.209
                    truefalse
                      high
                      contile.services.mozilla.com
                      34.117.188.166
                      truefalse
                        high
                        youtube.com
                        142.250.181.142
                        truefalse
                          high
                          prod.content-signature-chains.prod.webservices.mozgcp.net
                          34.160.144.191
                          truefalse
                            high
                            youtube-ui.l.google.com
                            172.217.19.238
                            truefalse
                              high
                              us-west1.prod.sumo.prod.webservices.mozgcp.net
                              34.149.128.2
                              truefalse
                                high
                                reddit.map.fastly.net
                                151.101.1.140
                                truefalse
                                  high
                                  ipv4only.arpa
                                  192.0.0.170
                                  truefalse
                                    high
                                    prod.ads.prod.webservices.mozgcp.net
                                    34.117.188.166
                                    truefalse
                                      high
                                      push.services.mozilla.com
                                      34.107.243.93
                                      truefalse
                                        high
                                        normandy-cdn.services.mozilla.com
                                        35.201.103.21
                                        truefalse
                                          high
                                          telemetry-incoming.r53-2.services.mozilla.com
                                          34.120.208.123
                                          truefalse
                                            high
                                            www.reddit.com
                                            unknown
                                            unknownfalse
                                              high
                                              spocs.getpocket.com
                                              unknown
                                              unknownfalse
                                                high
                                                content-signature-2.cdn.mozilla.net
                                                unknown
                                                unknownfalse
                                                  high
                                                  support.mozilla.org
                                                  unknown
                                                  unknownfalse
                                                    high
                                                    firefox.settings.services.mozilla.com
                                                    unknown
                                                    unknownfalse
                                                      high
                                                      www.youtube.com
                                                      unknown
                                                      unknownfalse
                                                        high
                                                        www.facebook.com
                                                        unknown
                                                        unknownfalse
                                                          high
                                                          detectportal.firefox.com
                                                          unknown
                                                          unknownfalse
                                                            high
                                                            normandy.cdn.mozilla.net
                                                            unknown
                                                            unknownfalse
                                                              high
                                                              shavar.services.mozilla.com
                                                              unknown
                                                              unknownfalse
                                                                high
                                                                www.wikipedia.org
                                                                unknown
                                                                unknownfalse
                                                                  high
                                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                                  https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                    high
                                                                    https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 00000012.00000002.3355582123.00000208D32C3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://detectportal.firefox.com/firefox.exe, 0000000E.00000003.2302586428.000002B446BE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          high
                                                                          https://datastudio.google.com/embed/reporting/firefox.exe, 0000000E.00000003.2181679689.000002B445E92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2338329100.000002B446FBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2278673346.000002B446FAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2292680602.000002B4471B8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.mozilla.com0gmpopenh264.dll.tmp.14.drfalse
                                                                              high
                                                                              https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2154015259.000002B44CA35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drfalse
                                                                                  high
                                                                                  https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000012.00000002.3355582123.00000208D328E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://www.leboncoin.fr/firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://mozilla.ofirefox.exe, 0000000E.00000003.2255663677.000002B446944000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://spocs.getpocket.com/spocsfirefox.exe, 0000000E.00000003.2303592186.000002B4468E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://screenshots.firefox.comfirefox.exe, 0000000E.00000003.2316801081.000002B44438F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://shavar.services.mozilla.comfirefox.exe, 0000000E.00000003.2278673346.000002B446FCA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306535721.000002B446FCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://completion.amazon.com/search/complete?q=firefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135997717.000002B442B8A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000E.00000003.2310284139.000002B4460C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2310284139.000002B4460A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171751527.000002B446BD7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000E.00000003.2275219247.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2275982106.000002B450295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2329209649.000002B4502A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://monitor.firefox.com/breach-details/firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000E.00000003.2290682768.000002B44CE35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2303227491.000002B446B6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257606640.000002B446D0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://profiler.firefox.com/firefox.exe, 0000000E.00000003.2316801081.000002B44438F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://www.msn.comfirefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000E.00000003.2134652698.000002B444A00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134958560.000002B442B38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135276847.000002B442B6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2135108892.000002B442B53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2134808923.000002B442B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://youtube.com/firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000E.00000003.2323574684.000002B44CEA3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=htfirefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://api.accounts.firefox.com/v1firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://www.amazon.com/firefox.exe, 0000000E.00000003.2242042947.000002B44C91F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://fpn.firefox.comfirefox.exe, 0000000E.00000003.2316556802.000002B4443EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2firefox.exe, 0000000E.00000003.2278788844.000002B446F73000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  http://win.mail.ru/cgi-bin/sentmsg?mailto=%sfirefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://www.youtube.com/firefox.exe, 00000012.00000002.3355582123.00000208D320C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179542558.000002B445EAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://MD8.mozilla.org/1/mfirefox.exe, 0000000E.00000003.2285149330.000002B44CDF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://www.bbc.co.uk/firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 00000012.00000002.3355582123.00000208D32C3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  http://127.0.0.1:firefox.exe, 0000000E.00000003.2292602245.000002B44C788000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000E.00000003.2181039845.000002B445EAA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179941760.000002B445E7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000E.00000003.2350862863.000002B446A09000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://bugzilla.mofirefox.exe, 0000000E.00000003.2290470632.000002B45020B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://mitmdetection.services.mozilla.com/firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000E.00000003.2171751527.000002B446BD7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://youtube.com/account?=recovery.jsonlz4.tmp.14.drfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://shavar.services.mozilla.com/firefox.exe, 0000000E.00000003.2306497736.000002B447125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBLfirefox.exe, 0000000E.00000003.2283971550.000002B450351000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&reffirefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477firefox.exe, 00000010.00000002.3356801021.0000019AD12C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DFE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3359612979.00000208D3506000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://spocs.getpocket.com/firefox.exe, 0000000E.00000003.2303592186.000002B4468E7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2323136150.000002B44EE5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3354398647.000001D11DF12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3355582123.00000208D3213000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://www.iqiyi.com/firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://youtube.com/account?=https://accounts.google.cofirefox.exe, 00000012.00000002.3358997113.00000208D33D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            high
                                                                                                                                                                                                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiprefs-1.js.14.drfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                high
                                                                                                                                                                                                                http://www.inbox.lv/rfc2368/?value=%sufirefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  high
                                                                                                                                                                                                                  https://monitor.firefox.com/user/dashboardfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                    high
                                                                                                                                                                                                                    https://bugzilla.mozilla.org/show_bug.cgi?id=1170143firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                      high
                                                                                                                                                                                                                      https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                        high
                                                                                                                                                                                                                        https://monitor.firefox.com/aboutfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                          high
                                                                                                                                                                                                                          http://mozilla.org/MPL/2.0/.firefox.exe, 0000000E.00000003.2241558282.000002B44C9E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2144403748.000002B4450C6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2255138741.000002B4450C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2317049010.000002B44244C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2293551860.000002B442B66000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257606640.000002B446D45000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2285980113.000002B44C968000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2314399836.000002B4457A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2311235999.000002B4458E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C9A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2315549476.000002B445145000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2301761978.000002B44815F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2144403748.000002B4450E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2276646089.000002B448157000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249797737.000002B4447F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2142998269.000002B445A28000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CAB4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2288873338.000002B446E11000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241886174.000002B44C957000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2295080503.000002B445A30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2281175923.000002B445A26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                            high
                                                                                                                                                                                                                            https://account.bellmedia.cfirefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                              high
                                                                                                                                                                                                                              https://login.microsoftonline.comfirefox.exe, 0000000E.00000003.2242759436.000002B448360000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                https://coverage.mozilla.orgfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                  high
                                                                                                                                                                                                                                  http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.14.drfalse
                                                                                                                                                                                                                                    high
                                                                                                                                                                                                                                    https://www.zhihu.com/firefox.exe, 0000000E.00000003.2241613776.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2306024868.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171339305.000002B44C9CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                      high
                                                                                                                                                                                                                                      http://x1.c.lencr.org/0firefox.exe, 0000000E.00000003.2171339305.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                        high
                                                                                                                                                                                                                                        http://x1.i.lencr.org/0firefox.exe, 0000000E.00000003.2171339305.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241613776.000002B44C9B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                          high
                                                                                                                                                                                                                                          http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000E.00000003.2325034010.000002B44C83E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                            high
                                                                                                                                                                                                                                            https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000E.00000003.2154811481.000002B44CA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264978651.000002B44CA30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2160646877.000002B44CA2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                              high
                                                                                                                                                                                                                                              https://blocked.cdn.mozilla.net/firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                                https://duckduckgo.com/?t=ffab&q=firefox.exe, 0000000E.00000003.2283690331.000002B450970000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                  high
                                                                                                                                                                                                                                                  https://profiler.firefox.comfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                    high
                                                                                                                                                                                                                                                    https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                      high
                                                                                                                                                                                                                                                      https://bugzilla.mozilla.org/show_bug.cgi?id=793869firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                        high
                                                                                                                                                                                                                                                        https://identity.mozilla.com/apps/relayfirefox.exe, 0000000E.00000003.2278933651.000002B446F35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                          high
                                                                                                                                                                                                                                                          https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                            high
                                                                                                                                                                                                                                                            https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000E.00000003.2334621076.000002B4474DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2277396057.000002B4474C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2157525785.000002B4474C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                              high
                                                                                                                                                                                                                                                              https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000E.00000003.2179510649.000002B445EBB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2181298311.000002B445F0F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E85000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2179719065.000002B445E94000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                                                https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000E.00000003.2246269756.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2269756730.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2316556802.000002B4443C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267131100.000002B441D6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2287253606.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2143800189.000002B441EDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182005715.000002B441EDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                  high
                                                                                                                                                                                                                                                                  https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/firefox.exe, 0000000E.00000003.2329448993.000002B45023F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290470632.000002B45023F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                    high
                                                                                                                                                                                                                                                                    https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000E.00000003.2314940985.000002B4453F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3358969106.0000019AD1300000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3358492142.000001D11E5A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3358862215.00000208D3340000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                      high
                                                                                                                                                                                                                                                                      https://www.amazon.co.uk/firefox.exe, 0000000E.00000003.2304761448.000002B44649E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                        high
                                                                                                                                                                                                                                                                        https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 0000000E.00000003.2328671490.000002B45038F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240623382.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240065053.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290311578.000002B450961000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2328268674.000002B4503F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2283690331.000002B450961000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                          high
                                                                                                                                                                                                                                                                          • No. of IPs < 25%
                                                                                                                                                                                                                                                                          • 25% < No. of IPs < 50%
                                                                                                                                                                                                                                                                          • 50% < No. of IPs < 75%
                                                                                                                                                                                                                                                                          • 75% < No. of IPs
                                                                                                                                                                                                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                                                                          142.250.181.142
                                                                                                                                                                                                                                                                          youtube.comUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          34.149.100.209
                                                                                                                                                                                                                                                                          prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                          2686ATGS-MMD-ASUSfalse
                                                                                                                                                                                                                                                                          34.107.243.93
                                                                                                                                                                                                                                                                          push.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          151.101.65.91
                                                                                                                                                                                                                                                                          services.addons.mozilla.orgUnited States
                                                                                                                                                                                                                                                                          54113FASTLYUSfalse
                                                                                                                                                                                                                                                                          34.107.221.82
                                                                                                                                                                                                                                                                          prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          35.244.181.201
                                                                                                                                                                                                                                                                          prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          34.117.188.166
                                                                                                                                                                                                                                                                          contile.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                          139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                                                                                                                                                                          35.201.103.21
                                                                                                                                                                                                                                                                          normandy-cdn.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          35.190.72.216
                                                                                                                                                                                                                                                                          prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          34.160.144.191
                                                                                                                                                                                                                                                                          prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                          2686ATGS-MMD-ASUSfalse
                                                                                                                                                                                                                                                                          34.120.208.123
                                                                                                                                                                                                                                                                          telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                          15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                          IP
                                                                                                                                                                                                                                                                          127.0.0.1
                                                                                                                                                                                                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                                                                          Analysis ID:1562274
                                                                                                                                                                                                                                                                          Start date and time:2024-11-25 12:57:10 +01:00
                                                                                                                                                                                                                                                                          Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                                                                          Overall analysis duration:0h 7m 9s
                                                                                                                                                                                                                                                                          Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                                                                          Report type:full
                                                                                                                                                                                                                                                                          Cookbook file name:default.jbs
                                                                                                                                                                                                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                                                                          Number of analysed new started processes analysed:21
                                                                                                                                                                                                                                                                          Number of new started drivers analysed:0
                                                                                                                                                                                                                                                                          Number of existing processes analysed:0
                                                                                                                                                                                                                                                                          Number of existing drivers analysed:0
                                                                                                                                                                                                                                                                          Number of injected processes analysed:0
                                                                                                                                                                                                                                                                          Technologies:
                                                                                                                                                                                                                                                                          • HCA enabled
                                                                                                                                                                                                                                                                          • EGA enabled
                                                                                                                                                                                                                                                                          • AMSI enabled
                                                                                                                                                                                                                                                                          Analysis Mode:default
                                                                                                                                                                                                                                                                          Analysis stop reason:Timeout
                                                                                                                                                                                                                                                                          Sample name:file.exe
                                                                                                                                                                                                                                                                          Detection:MAL
                                                                                                                                                                                                                                                                          Classification:mal72.troj.evad.winEXE@34/34@66/12
                                                                                                                                                                                                                                                                          EGA Information:
                                                                                                                                                                                                                                                                          • Successful, ratio: 50%
                                                                                                                                                                                                                                                                          HCA Information:
                                                                                                                                                                                                                                                                          • Successful, ratio: 94%
                                                                                                                                                                                                                                                                          • Number of executed functions: 40
                                                                                                                                                                                                                                                                          • Number of non-executed functions: 314
                                                                                                                                                                                                                                                                          Cookbook Comments:
                                                                                                                                                                                                                                                                          • Found application associated with file extension: .exe
                                                                                                                                                                                                                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                                                                                                                                                                                                          • Excluded IPs from analysis (whitelisted): 52.27.142.243, 52.32.237.164, 34.209.229.249, 184.30.24.109, 172.217.17.42, 172.217.17.74, 172.217.17.78, 88.221.134.155, 88.221.134.209
                                                                                                                                                                                                                                                                          • Excluded domains from analysis (whitelisted): shavar.prod.mozaws.net, fs.microsoft.com, ciscobinary.openh264.org, otelrules.azureedge.net, slscr.update.microsoft.com, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, e16604.g.akamaiedge.net, safebrowsing.googleapis.com, prod.fs.microsoft.com.akadns.net, location.services.mozilla.com
                                                                                                                                                                                                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                                                                                                          • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                                                                                                                                                          • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                                                                                                                                                          • VT rate limit hit for: file.exe
                                                                                                                                                                                                                                                                          TimeTypeDescription
                                                                                                                                                                                                                                                                          06:58:16API Interceptor1x Sleep call for process: firefox.exe modified
                                                                                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                          34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                              34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                  34.160.144.191file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                      151.101.65.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                                          services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                                                                                                                                                                                                          example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                                          star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                                          dyna.wikimedia.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 185.15.58.224
                                                                                                                                                                                                                                                                                                                                                          twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.129
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.129
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.129
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.65
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 104.244.42.65
                                                                                                                                                                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                                          GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.116.198.130
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.116.198.130
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                                          ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          https://protect-us.mimecast.com/s/N4SFCv2zvkHW7wOAuzlFYeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.36.49.68
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          FASTLYUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                                                                                                                                                                                                          Vendor Agreement Ready for Your Signature November 22 2024 at 084923 PM.msgGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 199.232.214.172
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.2.137
                                                                                                                                                                                                                                                                                                                                                          https://protect-us.mimecast.com/s/N4SFCv2zvkHW7wOAuzlFYeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                                          • 199.232.215.52
                                                                                                                                                                                                                                                                                                                                                          http://propdfhub.comGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                                          • 199.232.210.172
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          https://protect-us.mimecast.com/s/N4SFCv2zvkHW7wOAuzlFYeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.36.49.68
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                                          fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                                                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                                          C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):7813
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.177323216839492
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:192:uIKMi02pcbhbVbTbfbRbObtbyEl7nVr7JA6wnSrDtTkd/S1:uIP8cNhnzFSJ1ryjnSrDhkd/4
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:92AD7E110105B4CB40FDD430B91A4A65
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:C0B5152E7B2298B0AD9946F228293372142671D6
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:2FF726F5D02666B54096AC00E220A31B3F754ACDE75BF37A11DBD7CB36CD932E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:4098C7490F4C6EC59A651DA68B13DDBA692EB9856017D253427086EB26A084104CECD1E4B81230C10CAD28677054C769BEB266A51299E4D5D5BC5AEB04D8DC65
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"type":"uninstall","id":"2b1537bb-c451-4845-8722-2557b2f6c92c","creationDate":"2024-11-25T13:40:08.538Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"1fca7bd2-7b44-4c45-b0ea-e0486850ce95","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):7813
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.177323216839492
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:192:uIKMi02pcbhbVbTbfbRbObtbyEl7nVr7JA6wnSrDtTkd/S1:uIP8cNhnzFSJ1ryjnSrDhkd/4
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:92AD7E110105B4CB40FDD430B91A4A65
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:C0B5152E7B2298B0AD9946F228293372142671D6
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:2FF726F5D02666B54096AC00E220A31B3F754ACDE75BF37A11DBD7CB36CD932E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:4098C7490F4C6EC59A651DA68B13DDBA692EB9856017D253427086EB26A084104CECD1E4B81230C10CAD28677054C769BEB266A51299E4D5D5BC5AEB04D8DC65
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"type":"uninstall","id":"2b1537bb-c451-4845-8722-2557b2f6c92c","creationDate":"2024-11-25T13:40:08.538Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"1fca7bd2-7b44-4c45-b0ea-e0486850ce95","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):453023
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:true
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):3621
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.923990466756231
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:48:YnSwkmrOVPUFRbOdwNIOdoWLEWLtkDZuwpx5FBvipA6kb92the6LuhakNx9Uxeln:8S+OVPUFRbOdwNIOdYpjvY1Q6LK68P
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:429DD5531356156EBA352ECFAFDD0B0E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:322FE53FCC55E6C0805C0CBEBC0ACE4EE4CD5C0E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:4EC0E5CEB363C6509800C12A48DEF4A20FEFF78DDE1685FD233B04DF9FCB12E1
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:BFB158C20E00AFDF0F6D36A8D1784DF813B4143ABAD19C871FFC80DCC3436A8AF090B41DA3D986D52914738F1680AF3355961D508997E3BD8477C56A76705EFA
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"3ba649bc-be47-4b92-8762-21cab57bda3b","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-04T13:40:33.697Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):3621
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.923990466756231
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:48:YnSwkmrOVPUFRbOdwNIOdoWLEWLtkDZuwpx5FBvipA6kb92the6LuhakNx9Uxeln:8S+OVPUFRbOdwNIOdYpjvY1Q6LK68P
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:429DD5531356156EBA352ECFAFDD0B0E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:322FE53FCC55E6C0805C0CBEBC0ACE4EE4CD5C0E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:4EC0E5CEB363C6509800C12A48DEF4A20FEFF78DDE1685FD233B04DF9FCB12E1
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:BFB158C20E00AFDF0F6D36A8D1784DF813B4143ABAD19C871FFC80DCC3436A8AF090B41DA3D986D52914738F1680AF3355961D508997E3BD8477C56A76705EFA
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"3ba649bc-be47-4b92-8762-21cab57bda3b","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-04T13:40:33.697Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 22422 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):5308
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.599374203470186
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:96:z2YbKsKNU2xWrp327tGmD4wBON6h6cHAHJVauvjZHjkTymdS1/qTMg6Uhm:zTx2x2t0FDJ4NpkuvjdeplTMohm
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:EB56C2F4DA9435F3D5574161F414CD17
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:74A8FC3EC0559740FD9D835B638354985E2DEAB6
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:394E803D5FF8E156DFA7D15E96B51A683F4624A1BCF88EAA532399AC2C9B0966
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:DF90568D191C757392FB85BDDA5333C7FE7E3BB370C5DE8C50DD810B938D732E39B5608FB4494CAADAE99E1601989FDFC0FEBDCF70F27FFE581F904170A81E0F
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40..W....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 22422 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):5308
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.599374203470186
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:96:z2YbKsKNU2xWrp327tGmD4wBON6h6cHAHJVauvjZHjkTymdS1/qTMg6Uhm:zTx2x2t0FDJ4NpkuvjdeplTMohm
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:EB56C2F4DA9435F3D5574161F414CD17
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:74A8FC3EC0559740FD9D835B638354985E2DEAB6
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:394E803D5FF8E156DFA7D15E96B51A683F4624A1BCF88EAA532399AC2C9B0966
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:DF90568D191C757392FB85BDDA5333C7FE7E3BB370C5DE8C50DD810B938D732E39B5608FB4494CAADAE99E1601989FDFC0FEBDCF70F27FFE581F904170A81E0F
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40..W....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):24
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):24
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):262144
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.04905141882491872
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:24:DLSvwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:DKwae+QtMImelekKDa5
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:8736A542C5564A922C47B19D9CC5E0F2
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:CE9D58967DA9B5356D6C1D8A482F9CE74DA9097A
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:97CE5D8AFBB0AA610219C4FAC3927E32C91BFFD9FD971AF68C718E7B27E40077
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:99777325893DC7A95FD49B2DA18D32D65F97CC7A8E482D78EDC32F63245457FA5A52750800C074D552D20B6A215604161FDC88763D93C76A8703470C3064196B
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):66
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):66
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):36830
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.1867463390487
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:768:JI4avfWX94O6L4x4ME454N4ohvM4T4Pia4T4I4t54U:JI4KvG
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:98875950B62B398FFE70C0A8D0998017
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:CFCFFF938402E53D341FE392E25D2E6C557E548F
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:1B445C7E12712026D4E663426527CE58FD221D2E26545AEA699E67D60F16E7F0
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:728FF6FF915A45B44D720F41F9545F41F1BF5FB218D58073BD27DB19145D2225488988BE80FB0F712922D7B661E1A64448E3F71F09A1480B6F20BD2480888ABF
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{7a5650ac-9a89-4807-a040-9f0832bf39a9}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):36830
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.1867463390487
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:768:JI4avfWX94O6L4x4ME454N4ohvM4T4Pia4T4I4t54U:JI4KvG
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:98875950B62B398FFE70C0A8D0998017
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:CFCFFF938402E53D341FE392E25D2E6C557E548F
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:1B445C7E12712026D4E663426527CE58FD221D2E26545AEA699E67D60F16E7F0
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:728FF6FF915A45B44D720F41F9545F41F1BF5FB218D58073BD27DB19145D2225488988BE80FB0F712922D7B661E1A64448E3F71F09A1480B6F20BD2480888ABF
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{7a5650ac-9a89-4807-a040-9f0832bf39a9}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):1021904
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                                                                                                                                                  Joe Sandbox View:
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):1021904
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                                                                                                                                                  Joe Sandbox View:
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:ASCII text
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):116
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:ASCII text
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):116
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):98304
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.07331925341180502
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkid:DLhesh7Owd4+jid
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:D64511F9006C4B950D3A34EF6C3040EE
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:DF2828E7E905B8A50BD6D9EE8DD11DBA1D9EE7DC
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:F631D4A80FB24A12DBEBBC76406A23162980E750905A59A8676757EFCFFE624A
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:23CD76A3027D8CA4210C77FBAD6EA4DE3284157AE3B96200AE1819B9B296A20D2B21DE6E95E4AC917A7401CE617322E1316B0964419B954D16096003283B438C
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.035455806264726504
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:GtlstFjAXGXJVGtlstFjAXGXJVXlJ89//alEl:GtWtSXCetWtSXC9J89XuM
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:9EAAA44B036B0ED0F43F06BB21A85EAB
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:A31F50C8E6E89B28A2BCE843AAA0041865DA8A8B
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:3CC38557D3F31C0807FD8A865C4C5D0DF28CA8A68B8474078012796001F9E33E
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:C3C506B54993BA676B42823153586B7C8541D83B2D898EC2BB6B02C3BBE2525FA7B29996939637C1706AD46985F10DA0DF5447036CACB84E61873D04C9FDD856
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:..-.......................SH..c..(...j...V.....y..-.......................SH..c..(...j...V.....y........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):32824
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.03983632420097889
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:Ol1ebHjDmg36rD2Tjrl8rEXsxdwhml8XW3R2:KgnzUqbl8dMhm93w
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:964A659A3B3762790AE53F5461F340FD
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:4A2CDF9E8A3D7681016399693DCB0D8F36E158E3
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:9D07E261ECAC7975E57EBED747633BB566CB15AE270EE610A070B4D58A9E69DD
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:79FA1CF041185C9D1D9C292446B91571EDB6B473A4A9C56BD6EE9C01B3108ED3C9A2E52C8D507CCA4212796DEA9F8D9339C3EFB79FA3916ACF844FA8637B8EB1
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:7....-...........(...j..V.+.n'.........(...j..HS...c..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:ASCII text, with very long lines (1743), with CRLF line terminators
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):13187
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.477917526249868
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:192:FnPOeRnLYbBp60J0aX+l6SEXKyDhuNil5RHWNBw8dgSl:RDehJU8PUiHEwH0
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:6B30DB012E3D94815433475D73FA1860
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:5376EF8012EA0FB9D125DD16CCDDC6556B732D51
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:521F6004A84FFF406E10B771B47DEEF7B39A3D40472C13D2AFEAD17BC21FEA49
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:0B2092881A2598D2DA333406EC852C9D69ACCDB921A0FC8ECB25669979F24D9BDCA0B0A9EF1D5BD01E0026BB21E8F459BE9249EB183C144048DC9405E51A8C12
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "9e34c6e7-cbed-40a0-ba63-35488e171013");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1732541978);..user_pref("app.update.lastUpdateTime.background-update-timer", 1732541978);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1732541978);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173254
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:ASCII text, with very long lines (1743), with CRLF line terminators
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):13187
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.477917526249868
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:192:FnPOeRnLYbBp60J0aX+l6SEXKyDhuNil5RHWNBw8dgSl:RDehJU8PUiHEwH0
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:6B30DB012E3D94815433475D73FA1860
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:5376EF8012EA0FB9D125DD16CCDDC6556B732D51
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:521F6004A84FFF406E10B771B47DEEF7B39A3D40472C13D2AFEAD17BC21FEA49
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:0B2092881A2598D2DA333406EC852C9D69ACCDB921A0FC8ECB25669979F24D9BDCA0B0A9EF1D5BD01E0026BB21E8F459BE9249EB183C144048DC9405E51A8C12
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "9e34c6e7-cbed-40a0-ba63-35488e171013");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1732541978);..user_pref("app.update.lastUpdateTime.background-update-timer", 1732541978);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1732541978);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173254
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):65536
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:lSGBl/l/zl9l/AltllPltlnKollzvulJOlzALRWemFxu7TuRjBFbrl58lcV+wgn8:ltBl/lqN1K4BEJYqWvLue3FMOrMZ0l
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:60C09456D6362C6FBED48C69AA342C3C
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:58B6E22DAA48C75958B429F662DEC1C011AE74D3
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:FE1A432A2CD096B7EEA870D46D07F5197E34B4D10666E6E1C357FAA3F2FE2389
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:936DBC887276EF07732783B50EAFE450A8598B0492B8F6C838B337EF3E8A6EA595E7C7A2FA4B3E881887FAAE2D207B953A4C65ED8C964D93118E00D3E03882BD
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):90
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):90
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):1563
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.343416884379171
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:24:v+USUGlcAxSQEsrLXnIrn/pnxQwRcWT5sKmgb0y3eHVpjO+QamhujJwO2c0TiVmm:GUpOxksrYnRcoeg/3erjxQ4Jwc3zBtb
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:222C7A3732ED36C6217208721007A611
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:23430E425DC91BDAA2D561CDD0B30CFF400C153C
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:11DA5995B1B3DA5556447BA440F6ECE1DECC563EF6E53EAD0073EFEE5DCA5643
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:9968DA0F98224D5B9F8552BB4C1AACB97E01333B7742DF789A51A0E8CE56C272F4D05124C48D2937B78C54E50111A3FC2AD381B64153E75BA6915FCC319EDFE6
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":7,"docshellUU...D"{3f2226c0-833a-4522-aabe-3d7bf0f597bc}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":8,"persistK..+}],"lastAccessed":1732541984130,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2150633470....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...98952893-68ff-4a5d-a164-705c709ed3db","zD..1...Wm..l........j..:....1":{..jUpdate.....wtartTim..P48495...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...'b03116d8508741e1c0453eca6046028f71c7c2b904be5e0a0d4686...b1764f","pa..p"/","na..a"taarI|.Tecure2..C.Donly..fexpiry...52922,"originA...."fi
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):1563
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.343416884379171
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:24:v+USUGlcAxSQEsrLXnIrn/pnxQwRcWT5sKmgb0y3eHVpjO+QamhujJwO2c0TiVmm:GUpOxksrYnRcoeg/3erjxQ4Jwc3zBtb
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:222C7A3732ED36C6217208721007A611
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:23430E425DC91BDAA2D561CDD0B30CFF400C153C
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:11DA5995B1B3DA5556447BA440F6ECE1DECC563EF6E53EAD0073EFEE5DCA5643
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:9968DA0F98224D5B9F8552BB4C1AACB97E01333B7742DF789A51A0E8CE56C272F4D05124C48D2937B78C54E50111A3FC2AD381B64153E75BA6915FCC319EDFE6
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":7,"docshellUU...D"{3f2226c0-833a-4522-aabe-3d7bf0f597bc}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":8,"persistK..+}],"lastAccessed":1732541984130,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2150633470....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...98952893-68ff-4a5d-a164-705c709ed3db","zD..1...Wm..l........j..:....1":{..jUpdate.....wtartTim..P48495...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...'b03116d8508741e1c0453eca6046028f71c7c2b904be5e0a0d4686...b1764f","pa..p"/","na..a"taarI|.Tecure2..C.Donly..fexpiry...52922,"originA...."fi
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):1563
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.343416884379171
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:24:v+USUGlcAxSQEsrLXnIrn/pnxQwRcWT5sKmgb0y3eHVpjO+QamhujJwO2c0TiVmm:GUpOxksrYnRcoeg/3erjxQ4Jwc3zBtb
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:222C7A3732ED36C6217208721007A611
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:23430E425DC91BDAA2D561CDD0B30CFF400C153C
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:11DA5995B1B3DA5556447BA440F6ECE1DECC563EF6E53EAD0073EFEE5DCA5643
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:9968DA0F98224D5B9F8552BB4C1AACB97E01333B7742DF789A51A0E8CE56C272F4D05124C48D2937B78C54E50111A3FC2AD381B64153E75BA6915FCC319EDFE6
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":7,"docshellUU...D"{3f2226c0-833a-4522-aabe-3d7bf0f597bc}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":8,"persistK..+}],"lastAccessed":1732541984130,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2150633470....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...98952893-68ff-4a5d-a164-705c709ed3db","zD..1...Wm..l........j..:....1":{..jUpdate.....wtartTim..P48495...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...'b03116d8508741e1c0453eca6046028f71c7c2b904be5e0a0d4686...b1764f","pa..p"/","na..a"taarI|.Tecure2..C.Donly..fexpiry...52922,"originA...."fi
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):4096
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):4537
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.029518879199059
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:96:yc2MTEr5/lLmI2Ac1zzcxvbw6Kkgrc2Rn27:5TEr5NX0z3DhRe
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:035CA9E596BA232E51293B450C73F999
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:C550ECF7327A1157F2A26A5ECC7F65E80A5D9544
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:596E17246DA534E947BB24032CB2D294B596263F12AE278EE99A33CB927AC181
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:034FCBC8A1D133496492AA6D57EC143B125B0B1B6E59F0AEB90978C0C438BB1BE560BD4E9B58423EA16EF5D63257AF0A3CA0042C67F524AF5C7579DEA3CE8EBA
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-25T13:39:23.344Z","profileAgeCreated":1696426830133,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                                                                                                                                                                  Size (bytes):4537
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):5.029518879199059
                                                                                                                                                                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:96:yc2MTEr5/lLmI2Ac1zzcxvbw6Kkgrc2Rn27:5TEr5NX0z3DhRe
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:035CA9E596BA232E51293B450C73F999
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:C550ECF7327A1157F2A26A5ECC7F65E80A5D9544
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-256:596E17246DA534E947BB24032CB2D294B596263F12AE278EE99A33CB927AC181
                                                                                                                                                                                                                                                                                                                                                                                                  SHA-512:034FCBC8A1D133496492AA6D57EC143B125B0B1B6E59F0AEB90978C0C438BB1BE560BD4E9B58423EA16EF5D63257AF0A3CA0042C67F524AF5C7579DEA3CE8EBA
                                                                                                                                                                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                                                                                                                                                                  Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-25T13:39:23.344Z","profileAgeCreated":1696426830133,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                                                                                                                                                                  Entropy (8bit):6.592279224008089
                                                                                                                                                                                                                                                                                                                                                                                                  TrID:
                                                                                                                                                                                                                                                                                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                                                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                                                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                                                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                                                                                                                                                                  File name:file.exe
                                                                                                                                                                                                                                                                                                                                                                                                  File size:922'624 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5:da7a7d753dee0257505654e753e7adea
                                                                                                                                                                                                                                                                                                                                                                                                  SHA1:8b7f1ea501592bd3f6bed17ca62cba63a8994b4e
                                                                                                                                                                                                                                                                                                                                                                                                  SHA256:7ecf97ea56c6f1f39674123ccede879e5482470477abe7947f1dbb7dcc83efdf
                                                                                                                                                                                                                                                                                                                                                                                                  SHA512:4488f6a23aed45b03e51874df2f41955412d71086915e51d58e2e387ab82dfc0a4a382464005e19cebe9040d4343bf2c31b23e5316e8f6236ae6f6fe33953419
                                                                                                                                                                                                                                                                                                                                                                                                  SSDEEP:12288:8qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga5T+:8qDEvCTbMWu7rQYlBQcBiT6rprG8a9+
                                                                                                                                                                                                                                                                                                                                                                                                  TLSH:66159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                                                                                                                                                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                                                                                                                                                                                  Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                                                                                                                                                                                  Entrypoint:0x420577
                                                                                                                                                                                                                                                                                                                                                                                                  Entrypoint Section:.text
                                                                                                                                                                                                                                                                                                                                                                                                  Digitally signed:false
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                                                                                                                                                                                  Subsystem:windows gui
                                                                                                                                                                                                                                                                                                                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                                                                                                                                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                                                                                                                                                                  Time Stamp:0x6744635C [Mon Nov 25 11:45:32 2024 UTC]
                                                                                                                                                                                                                                                                                                                                                                                                  TLS Callbacks:
                                                                                                                                                                                                                                                                                                                                                                                                  CLR (.Net) Version:
                                                                                                                                                                                                                                                                                                                                                                                                  OS Version Major:5
                                                                                                                                                                                                                                                                                                                                                                                                  OS Version Minor:1
                                                                                                                                                                                                                                                                                                                                                                                                  File Version Major:5
                                                                                                                                                                                                                                                                                                                                                                                                  File Version Minor:1
                                                                                                                                                                                                                                                                                                                                                                                                  Subsystem Version Major:5
                                                                                                                                                                                                                                                                                                                                                                                                  Subsystem Version Minor:1
                                                                                                                                                                                                                                                                                                                                                                                                  Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                                                                                                                                                                                  Instruction
                                                                                                                                                                                                                                                                                                                                                                                                  call 00007FD5A085EBC3h
                                                                                                                                                                                                                                                                                                                                                                                                  jmp 00007FD5A085E4CFh
                                                                                                                                                                                                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                                                                                                                                                                                                  push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                                                                  call 00007FD5A085E6ADh
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                                                                                                                                                                                  mov eax, esi
                                                                                                                                                                                                                                                                                                                                                                                                  pop esi
                                                                                                                                                                                                                                                                                                                                                                                                  pop ebp
                                                                                                                                                                                                                                                                                                                                                                                                  retn 0004h
                                                                                                                                                                                                                                                                                                                                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                                                                  mov eax, ecx
                                                                                                                                                                                                                                                                                                                                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                                                                                                                                                                                  ret
                                                                                                                                                                                                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                                                                                                                                                                                                  push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                                                                  call 00007FD5A085E67Ah
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                                                                                                                                                                                  mov eax, esi
                                                                                                                                                                                                                                                                                                                                                                                                  pop esi
                                                                                                                                                                                                                                                                                                                                                                                                  pop ebp
                                                                                                                                                                                                                                                                                                                                                                                                  retn 0004h
                                                                                                                                                                                                                                                                                                                                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                                                                  mov eax, ecx
                                                                                                                                                                                                                                                                                                                                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                                                                                                                                                                                  ret
                                                                                                                                                                                                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                                                                  lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                                                                  and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                                                                                                                                                                                  and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                                                                                                                                                                                                  mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                                                                  add eax, 04h
                                                                                                                                                                                                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                                                                                                                                                                                                  call 00007FD5A086126Dh
                                                                                                                                                                                                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                                                                                                                                                                                                  mov eax, esi
                                                                                                                                                                                                                                                                                                                                                                                                  pop esi
                                                                                                                                                                                                                                                                                                                                                                                                  pop ebp
                                                                                                                                                                                                                                                                                                                                                                                                  retn 0004h
                                                                                                                                                                                                                                                                                                                                                                                                  lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                                                                                                                                                                                                  call 00007FD5A08612B8h
                                                                                                                                                                                                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                                                                                                                                                                                                  ret
                                                                                                                                                                                                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                                                                  lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                                                                                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                                                                                                                                                                                                  call 00007FD5A08612A1h
                                                                                                                                                                                                                                                                                                                                                                                                  test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                                                                                                                                                                                                  Programming Language:
                                                                                                                                                                                                                                                                                                                                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                                                                                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000xa8b4.rsrc
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xdf0000x7594.reloc
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                                                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                                                                                                                                                                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                                                                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                                                                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                                                                                                                                                                  .rsrc0xd40000xa8b40xaa0049e549d24bb30c0e998a1eac2ea2a70eFalse0.3710248161764706data5.653460399456609IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                                                                  .reloc0xdf0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                                                                                                                                                                                  RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                                                                                                                                                                                  RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                                                                                                                                                                                  RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                                                                                                                                                                                  RT_RCDATA0xdc7b80x1b7adata1.0015638328120557
                                                                                                                                                                                                                                                                                                                                                                                                  RT_GROUP_ICON0xde3340x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                                                                                                                                                                                  RT_GROUP_ICON0xde3ac0x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                                                                                                                                                  RT_GROUP_ICON0xde3c00x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                                                                                                                                                                                  RT_GROUP_ICON0xde3d40x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                                                                                                                                                  RT_VERSION0xde3e80xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                                                                                                                                                                                  RT_MANIFEST0xde4c40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                                                                                                                                                                                  DLLImport
                                                                                                                                                                                                                                                                                                                                                                                                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                                                                                                                                                                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                                                                                                                                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                                                                                                                                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                                                                                                                                                                                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                                                                                                                                                                                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                                                                                                                                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                                                                                                                                                                                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                                                                                                                                                                                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                                                                                                                                                                                  UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                                                                                                                                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                                                                                                                                                                                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                                                                                                                                                                                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                                                                                                                                                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                                                                                                                                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                                                                                                                                                                                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                                                                                                                                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                                                                                                                                                                                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                                                                                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                                                                                                                                                                  EnglishGreat Britain
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.707287073 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.707350016 CET4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.707525015 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.712177992 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.712203026 CET4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.197343111 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.197365999 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.197436094 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.198915958 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.198932886 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.199323893 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.199383974 CET44349712142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.199439049 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.200881958 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.200895071 CET44349712142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.314522028 CET4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.434047937 CET804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.448066950 CET4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.448630095 CET4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.568190098 CET804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.707560062 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.707604885 CET4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.708025932 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.708034992 CET4434971535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.709067106 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.709184885 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.710510015 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.710521936 CET4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.710655928 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.710668087 CET4434971535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.850558043 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.850590944 CET4434971634.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.850766897 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.852205038 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.852221012 CET4434971634.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.933435917 CET4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.933573961 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.942270994 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.942287922 CET4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.942408085 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.942547083 CET4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.942625999 CET49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014496088 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014533043 CET4434971734.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014693975 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014869928 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014885902 CET4434971734.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.580240965 CET804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.623368025 CET4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.861988068 CET4971980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.900825977 CET44349712142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.900906086 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.902348042 CET44349712142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.902489901 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.909879923 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.909893990 CET44349712142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.909986973 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.910129070 CET44349712142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.910188913 CET49712443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.980217934 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.980294943 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.980911970 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.980957985 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.981538057 CET804971934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.981621027 CET4971980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.981745958 CET4434971535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.981890917 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.985551119 CET4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.985635996 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.011841059 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.011862040 CET4434971535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.012217045 CET4971980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.012976885 CET4434971535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.016508102 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.016525984 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.016727924 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.016732931 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.016745090 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.018976927 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.019002914 CET44349720142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.020153999 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.021789074 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.021806002 CET44349720142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.022701025 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.022713900 CET4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.022799969 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.022962093 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023015022 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023262978 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023293018 CET4434972134.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023448944 CET4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023458004 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023521900 CET49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.023658037 CET4434971535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.024437904 CET49715443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.025088072 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.025104046 CET4434972134.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.085510969 CET4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.123996973 CET4434971634.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.124073982 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.129213095 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.129220963 CET4434971634.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.129317999 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.129494905 CET4434971634.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.129559040 CET49716443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.131855011 CET804971934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.205888033 CET804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.205949068 CET4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.223335028 CET44349711142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.225126028 CET49711443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.249089956 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.249125957 CET4434972234.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.249806881 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.250196934 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.251564980 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.251576900 CET4434972234.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.276169062 CET4434971734.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.276249886 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.279333115 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.279345989 CET4434971734.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.279598951 CET4434971734.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.281619072 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.281725883 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.281789064 CET4434971734.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.282052994 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.282061100 CET4434972434.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.283612967 CET49717443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.283653021 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.283807993 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.283819914 CET4434972434.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.369409084 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.369520903 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.369734049 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.489267111 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.068811893 CET804971934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.074143887 CET4971980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.383668900 CET4971980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.417135954 CET804971934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.417239904 CET4971980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.418127060 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.418159962 CET4434972634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.418509960 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.419775009 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.419787884 CET4434972634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.420809984 CET4434972134.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.421181917 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.427161932 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.427170038 CET4434972134.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.427187920 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.427413940 CET4434972134.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.428280115 CET49721443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.436446905 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.436476946 CET4434972735.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.436836004 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.436944008 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.436950922 CET4434972735.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.437309027 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.437386036 CET4434972834.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.437725067 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.439023972 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.439079046 CET4434972834.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.457251072 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.463731050 CET4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.492057085 CET4434972434.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.492141008 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.495007992 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.495018005 CET4434972434.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.495275021 CET4434972434.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.496978045 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.497086048 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.497163057 CET4434972434.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.498838902 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.498858929 CET49724443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.501179934 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.503561974 CET804971934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.517921925 CET4434972234.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.518127918 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.527612925 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.527630091 CET4434972234.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.527776003 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.527857065 CET4434972234.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.528214931 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.528318882 CET4434973034.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.529350042 CET49722443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.529417992 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.530811071 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.530858994 CET4434973034.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.583369017 CET804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.586544037 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.586592913 CET4434973134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.590590000 CET4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.590697050 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.620630026 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.626596928 CET4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.628117085 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.628137112 CET4434973134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.714580059 CET44349720142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.714689970 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.715614080 CET44349720142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.715712070 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.718974113 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.718982935 CET44349720142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.719048023 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.719197035 CET44349720142.250.181.142192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.722774982 CET49720443192.168.2.5142.250.181.142
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.746211052 CET804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.815882921 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.878982067 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.897335052 CET4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.013782024 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.060537100 CET804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.133596897 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.148770094 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.148930073 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.269437075 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.519452095 CET804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.519532919 CET4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.640436888 CET4434972634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.640548944 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.646055937 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.646065950 CET4434972634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.646147013 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.646370888 CET4434972634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.646430969 CET49726443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.657948017 CET4434972834.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.658024073 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.682467937 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.682496071 CET4434972834.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.682560921 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.682782888 CET4434972834.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.682841063 CET49728443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.742957115 CET4434972735.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.743099928 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.746125937 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.746186018 CET4434972735.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.746457100 CET4434972735.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.749013901 CET4434973034.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.749072075 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.797254086 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.799870968 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.799962997 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800061941 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800090075 CET4434973034.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800111055 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800141096 CET4434972735.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800255060 CET49727443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800326109 CET4434973034.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.800385952 CET49730443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.946038961 CET4434973134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.947396040 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.014328957 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.014350891 CET4434973134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.014410973 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.014985085 CET4434973134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.015129089 CET49731443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.327466011 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.383310080 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.185745001 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.292733908 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.292785883 CET4434973534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.293368101 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.293421030 CET4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.293534994 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.293555975 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.294405937 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.294409037 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.294414043 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.295918941 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.295932055 CET4434973534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.296190023 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.296205044 CET4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.296257973 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.296271086 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.305370092 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.500622988 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.554511070 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.596541882 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.596602917 CET4434973834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.596849918 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.598166943 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.598184109 CET4434973834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.676481962 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.796003103 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.009135962 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.055974007 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.507843018 CET4434973534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.510286093 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.554012060 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.559175014 CET4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.559338093 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.563024044 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.563046932 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.856307983 CET4434973834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.856395960 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.130983114 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.131000042 CET4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.132010937 CET4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.134313107 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.134327888 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.134643078 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.140974998 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141004086 CET4434973534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141040087 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141299963 CET4434973534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141727924 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141742945 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141823053 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.141868114 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.142009974 CET4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.142204046 CET4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.143665075 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.143690109 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144022942 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144033909 CET4434973834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144057989 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144160032 CET49735443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144176960 CET49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144210100 CET49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144232988 CET4434973834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.144320011 CET49738443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.780296087 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.780340910 CET4434974734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.785017014 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.785120010 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.785128117 CET4434974734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.979866982 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.981237888 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.981272936 CET4434974834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.982598066 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.984113932 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.984138966 CET4434974834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.992280006 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.992305994 CET4434974934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.993459940 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.995011091 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.995032072 CET4434974934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.294363022 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.308398962 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.308578968 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.363342047 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.413938999 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.558094978 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.558130026 CET4434975034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.560029030 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.563980103 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.564198017 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.564217091 CET4434975034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.679905891 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.892978907 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.942944050 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.042496920 CET4434974734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.042567968 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.129678965 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.129708052 CET4434974734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.130188942 CET4434974734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.131990910 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.132040977 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.132184029 CET49747443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.247886896 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.367872953 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.446456909 CET4434974834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.446532965 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.491935015 CET4434974934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.492023945 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.562527895 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.613908052 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.821945906 CET4434975034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.822022915 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.320332050 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.320354939 CET4434975034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.320719004 CET4434975034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.325404882 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.325418949 CET4434974834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.325496912 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.325628996 CET4434974834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326097012 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326153040 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326303005 CET4434975034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326324940 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326337099 CET4434974934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326385021 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326539993 CET4434974934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326767921 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326767921 CET49748443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326798916 CET49750443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.326798916 CET49749443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.703111887 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.710261106 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.822874069 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.829790115 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.025007010 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.036300898 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.079698086 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.079703093 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.569804907 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.689711094 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.902333021 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.951081991 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.594571114 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.714083910 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.909624100 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.913136005 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.962692976 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:36.032749891 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:36.245687962 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:36.294831991 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.712071896 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.712115049 CET4434978534.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.712532997 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.713884115 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.713897943 CET4434978534.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.972274065 CET4434978534.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.974164009 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.979398012 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.979413986 CET4434978534.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.979489088 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.979656935 CET4434978534.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.979861021 CET49785443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.982938051 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.102399111 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.299257040 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.302508116 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.349915028 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.422015905 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.636177063 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.682024956 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.116923094 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.116955996 CET4434979134.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.117350101 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.117491961 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.117500067 CET4434979134.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.278023005 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.278049946 CET4434979235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.278323889 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.278517962 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.278533936 CET4434979235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.331157923 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.331193924 CET4434979335.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.343121052 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.345788956 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.345803976 CET4434979335.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.349841118 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.349881887 CET44349794151.101.65.91192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.350670099 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.350816965 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.350833893 CET44349794151.101.65.91192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.630397081 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.630438089 CET4434979535.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.630786896 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.632194996 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.632211924 CET4434979535.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.432115078 CET4434979134.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.432200909 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.435120106 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.435127974 CET4434979134.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.435461044 CET4434979134.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.437334061 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.437452078 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.437504053 CET4434979134.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.437637091 CET49791443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.442853928 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.533394098 CET4434979235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.533476114 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.536461115 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.536469936 CET4434979235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.536717892 CET4434979235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.538326025 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.538484097 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.538501978 CET4434979235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.539028883 CET49792443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.562354088 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.601798058 CET4434979335.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.601813078 CET4434979335.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.601866961 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.605927944 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.605936050 CET4434979335.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.606025934 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.606134892 CET4434979335.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.606677055 CET49793443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.655745983 CET44349794151.101.65.91192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.655842066 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.658983946 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.658998013 CET44349794151.101.65.91192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.659287930 CET44349794151.101.65.91192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.661776066 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.661875010 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.661937952 CET44349794151.101.65.91192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.662049055 CET49794443192.168.2.5151.101.65.91
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.671283960 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.671329021 CET4434980035.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.671783924 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.671920061 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.671930075 CET4434980035.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.673732996 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.673752069 CET4434980235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.674105883 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.674211979 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.674216986 CET4434980235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.676230907 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.676259041 CET4434980335.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.676462889 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.676561117 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.676573038 CET4434980335.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.761296034 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.764455080 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.803726912 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.884044886 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.892088890 CET4434979535.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.892165899 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.896959066 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.896970987 CET4434979535.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.897063971 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.897146940 CET4434979535.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.898710966 CET49795443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.900257111 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.910033941 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.910063982 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.910161018 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.910267115 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.910274982 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.020026922 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.097101927 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.142390013 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.215383053 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.218528986 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.258291006 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.338145971 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.551477909 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.606043100 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.885819912 CET4434980335.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.885891914 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.886089087 CET4434980235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.886456013 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.888802052 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.888809919 CET4434980335.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.889027119 CET4434980335.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.891035080 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.891040087 CET4434980235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.891262054 CET4434980235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.893992901 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894079924 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894110918 CET4434980335.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894160032 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894234896 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894279003 CET4434980235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894360065 CET49803443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.894368887 CET49802443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.898252010 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.929507971 CET4434980035.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.929577112 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.932106018 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.932110071 CET4434980035.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.932337046 CET4434980035.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.934227943 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.934295893 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.934343100 CET4434980035.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.934531927 CET49800443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.017867088 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.169822931 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.170010090 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.173456907 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.173472881 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.173801899 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.176383972 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.176574945 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.176696062 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.176704884 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.213217020 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.216188908 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.261184931 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.335710049 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.383358955 CET4434980434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.383425951 CET49804443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.549041986 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.593297005 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:56.220026016 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:56.339520931 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:56.552175045 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:56.671885967 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.463614941 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.463634014 CET4434984334.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.464046955 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.465456009 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.465466976 CET4434984334.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.723639011 CET4434984334.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.723783016 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.729089022 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.729096889 CET4434984334.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.729202986 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.729253054 CET4434984334.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.729434013 CET49843443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.731728077 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.851262093 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.046827078 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.049794912 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.096441984 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.169684887 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.382590055 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.428381920 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285073996 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285111904 CET4434986834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285335064 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285387039 CET4434986934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285959959 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.286104918 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.286158085 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.286164999 CET4434986834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.286289930 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.286304951 CET4434986934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.054670095 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.174115896 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.386821985 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.495122910 CET4434986834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.495193005 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.495208979 CET4434986934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.498153925 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.498162031 CET4434986834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.498423100 CET4434986834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.500185966 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.500360966 CET4434986834.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.502718925 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.503405094 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.503405094 CET49868443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.506618023 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.510477066 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.510495901 CET4434986934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.510768890 CET4434986934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.512919903 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.512999058 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.513073921 CET4434986934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.513165951 CET49869443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.515683889 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.635253906 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.830702066 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.833853960 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.872689962 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.953700066 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:15.166661024 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:15.220381975 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:24.832911968 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:24.952502966 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:25.186176062 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:25.306126118 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:34.961611986 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:35.081106901 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:35.315968990 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:35.435539007 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.513525963 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.513560057 CET4434994034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.515387058 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.516860008 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.516875029 CET4434994034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.091170073 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.210608959 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.445489883 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.565192938 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.772830963 CET4434994034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.772907019 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.779088974 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.779094934 CET4434994034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.779196024 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.779247999 CET4434994034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.779310942 CET49940443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.781738043 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.901231050 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.096350908 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.104618073 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.147000074 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.224734068 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.438611031 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.479118109 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:56.107038975 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:56.226701975 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:56.439172983 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:56.558890104 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:06.236171007 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:06.355874062 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:06.568146944 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:06.994571924 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:16.364757061 CET4972380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:16.484411955 CET804972334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:16.997706890 CET4973380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:17.117168903 CET804973334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.708219051 CET6077353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.845593929 CET53607731.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.848057032 CET6198153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.986471891 CET53619811.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.058590889 CET6321753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.176155090 CET5084353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.195355892 CET53632171.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.197812080 CET5249553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.314775944 CET6183153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.334713936 CET53524951.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.335521936 CET4928653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.447757959 CET5884553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.452617884 CET53618311.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.453355074 CET5001153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.472660065 CET53492861.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.584711075 CET53588451.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.590270996 CET53500111.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.708025932 CET5249653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.708507061 CET5188653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.712337017 CET5029153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.845093966 CET53524961.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.845918894 CET6007853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.849704027 CET53502911.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.850704908 CET6416953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.874603987 CET5387153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.929799080 CET53518861.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.930505991 CET5773453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.994343042 CET53600781.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.011677980 CET53538711.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014611006 CET6401253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.069212914 CET53577341.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.069372892 CET53641691.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.070270061 CET6187053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.152041912 CET53640121.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.177323103 CET5126853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.208096027 CET53618701.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.314537048 CET53512681.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.648842096 CET5508153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.651508093 CET6114453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.724119902 CET5812853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.786950111 CET53550811.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.788450003 CET53611441.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.562020063 CET6324053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.973822117 CET5827353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.053426027 CET5172953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.111052036 CET53582731.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.116897106 CET5413453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.119597912 CET53572101.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.418423891 CET5126653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434524059 CET53541341.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434602022 CET53517291.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.435367107 CET6019853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.437630892 CET6407553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.555531025 CET53512661.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.556361914 CET6401353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.573864937 CET53601981.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.575722933 CET53640751.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.592128992 CET6142653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.695559978 CET53640131.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.731853008 CET53614261.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.108521938 CET5761353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.248810053 CET53576131.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.250624895 CET5964053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.387620926 CET53596401.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.399713039 CET6171353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.540888071 CET53617131.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.131736040 CET5009153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.132019997 CET6457053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.132354021 CET6430253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET53500911.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268630981 CET53645701.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.269769907 CET5176153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.269840002 CET5592353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.270656109 CET53643021.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.271337986 CET6226253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406543970 CET53517611.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET53559231.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.407361984 CET6023553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.407808065 CET5630053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.408628941 CET53622621.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.409050941 CET5997353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544605970 CET53602351.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544622898 CET53563001.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.545557022 CET5450653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.545681953 CET5440253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.547554016 CET53599731.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.683075905 CET53544021.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.684046030 CET6122153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.766462088 CET53545061.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.767443895 CET5955053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.820998907 CET53612211.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.830005884 CET6441053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906178951 CET53595501.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906955004 CET5913653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.968449116 CET53644101.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:25.124581099 CET53591361.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.781222105 CET6485653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.923648119 CET53648561.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.979996920 CET5305153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.993170023 CET5391153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.308485031 CET53539111.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.712479115 CET6374153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.852164030 CET53637411.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.114180088 CET5785553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.277416945 CET5900453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.334144115 CET6113053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.344840050 CET53578551.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.350486040 CET4947853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.414561033 CET53590041.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.495656013 CET53494781.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.496469975 CET5594553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.629307032 CET53611301.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.630718946 CET5255153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.745641947 CET53559451.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.769942045 CET53525511.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.770946026 CET5994953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.908855915 CET53599491.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.443173885 CET6089153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.325618982 CET5240953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.462692022 CET53524091.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.463999033 CET6525153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.602106094 CET53652511.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285917044 CET6427253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.422770977 CET53642721.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.513920069 CET6262453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.650829077 CET53626241.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.782047033 CET4917553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.708219051 CET192.168.2.51.1.1.10xcd6dStandard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.848057032 CET192.168.2.51.1.1.10x9e8cStandard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.058590889 CET192.168.2.51.1.1.10x9500Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.176155090 CET192.168.2.51.1.1.10x4a7Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.197812080 CET192.168.2.51.1.1.10x46a4Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.314775944 CET192.168.2.51.1.1.10xc320Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.335521936 CET192.168.2.51.1.1.10x9f11Standard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.447757959 CET192.168.2.51.1.1.10x32bdStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.453355074 CET192.168.2.51.1.1.10x1c7Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.708025932 CET192.168.2.51.1.1.10xc5c4Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.708507061 CET192.168.2.51.1.1.10x1995Standard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.712337017 CET192.168.2.51.1.1.10x9065Standard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.845918894 CET192.168.2.51.1.1.10x7885Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.850704908 CET192.168.2.51.1.1.10xa15aStandard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.874603987 CET192.168.2.51.1.1.10x7cc3Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.930505991 CET192.168.2.51.1.1.10xfc75Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.014611006 CET192.168.2.51.1.1.10x12efStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.070270061 CET192.168.2.51.1.1.10x1f63Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.177323103 CET192.168.2.51.1.1.10x1d67Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.648842096 CET192.168.2.51.1.1.10xc9fbStandard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.651508093 CET192.168.2.51.1.1.10xd124Standard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.724119902 CET192.168.2.51.1.1.10x264fStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.562020063 CET192.168.2.51.1.1.10x668bStandard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.973822117 CET192.168.2.51.1.1.10xd960Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.053426027 CET192.168.2.51.1.1.10x3947Standard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.116897106 CET192.168.2.51.1.1.10x9fc5Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.418423891 CET192.168.2.51.1.1.10xffb5Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.435367107 CET192.168.2.51.1.1.10x81c4Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.437630892 CET192.168.2.51.1.1.10xd166Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.556361914 CET192.168.2.51.1.1.10xb86cStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.592128992 CET192.168.2.51.1.1.10x2867Standard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.108521938 CET192.168.2.51.1.1.10x124cStandard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.250624895 CET192.168.2.51.1.1.10x4e9Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.399713039 CET192.168.2.51.1.1.10x81cdStandard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.131736040 CET192.168.2.51.1.1.10x7b54Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.132019997 CET192.168.2.51.1.1.10x7fb5Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.132354021 CET192.168.2.51.1.1.10xa723Standard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.269769907 CET192.168.2.51.1.1.10x6be9Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.269840002 CET192.168.2.51.1.1.10x30d4Standard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.271337986 CET192.168.2.51.1.1.10x45baStandard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.407361984 CET192.168.2.51.1.1.10xc904Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.407808065 CET192.168.2.51.1.1.10x40c6Standard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.409050941 CET192.168.2.51.1.1.10x3cafStandard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.545557022 CET192.168.2.51.1.1.10x2275Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.545681953 CET192.168.2.51.1.1.10x5274Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.684046030 CET192.168.2.51.1.1.10xfd3aStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.767443895 CET192.168.2.51.1.1.10xbfecStandard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.830005884 CET192.168.2.51.1.1.10x5c33Standard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906955004 CET192.168.2.51.1.1.10xec52Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.781222105 CET192.168.2.51.1.1.10xae6dStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.979996920 CET192.168.2.51.1.1.10xb1f6Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.993170023 CET192.168.2.51.1.1.10xaafcStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:40.712479115 CET192.168.2.51.1.1.10xfd1aStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.114180088 CET192.168.2.51.1.1.10x83c3Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.277416945 CET192.168.2.51.1.1.10x75dcStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.334144115 CET192.168.2.51.1.1.10x708Standard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.350486040 CET192.168.2.51.1.1.10x8d8bStandard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.496469975 CET192.168.2.51.1.1.10xb38bStandard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.630718946 CET192.168.2.51.1.1.10x7eaStandard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.770946026 CET192.168.2.51.1.1.10x1d42Standard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.443173885 CET192.168.2.51.1.1.10x2391Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.325618982 CET192.168.2.51.1.1.10x60c9Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.463999033 CET192.168.2.51.1.1.10xa9deStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.285917044 CET192.168.2.51.1.1.10xd4f3Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:44.513920069 CET192.168.2.51.1.1.10x31c3Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.782047033 CET192.168.2.51.1.1.10x1cdStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.702523947 CET1.1.1.1192.168.2.50x6e1eNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:14.845593929 CET1.1.1.1192.168.2.50xcd6dNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.195355892 CET1.1.1.1192.168.2.50x9500No error (0)youtube.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.313276052 CET1.1.1.1192.168.2.50x4a7No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.313276052 CET1.1.1.1192.168.2.50x4a7No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.334713936 CET1.1.1.1192.168.2.50x46a4No error (0)youtube.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.452617884 CET1.1.1.1192.168.2.50xc320No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.472660065 CET1.1.1.1192.168.2.50x9f11No error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.584711075 CET1.1.1.1192.168.2.50x32bdNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.590270996 CET1.1.1.1192.168.2.50x1c7No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.591985941 CET1.1.1.1192.168.2.50x3d24No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.591985941 CET1.1.1.1192.168.2.50x3d24No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.845093966 CET1.1.1.1192.168.2.50xc5c4No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.849704027 CET1.1.1.1192.168.2.50x9065No error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.849704027 CET1.1.1.1192.168.2.50x9065No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.929799080 CET1.1.1.1192.168.2.50x1995No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.011677980 CET1.1.1.1192.168.2.50x7cc3No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.011677980 CET1.1.1.1192.168.2.50x7cc3No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.011677980 CET1.1.1.1192.168.2.50x7cc3No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.069372892 CET1.1.1.1192.168.2.50xa15aNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.152041912 CET1.1.1.1192.168.2.50x12efNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.314537048 CET1.1.1.1192.168.2.50x1d67No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.786950111 CET1.1.1.1192.168.2.50xc9fbNo error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.788450003 CET1.1.1.1192.168.2.50xd124No error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.788450003 CET1.1.1.1192.168.2.50xd124No error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.861035109 CET1.1.1.1192.168.2.50x264fNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.861035109 CET1.1.1.1192.168.2.50x264fNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.831187963 CET1.1.1.1192.168.2.50x668bNo error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.111052036 CET1.1.1.1192.168.2.50xd960No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.416840076 CET1.1.1.1192.168.2.50xa767No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434402943 CET1.1.1.1192.168.2.50xa37fNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434402943 CET1.1.1.1192.168.2.50xa37fNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434524059 CET1.1.1.1192.168.2.50x9fc5No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434602022 CET1.1.1.1192.168.2.50x3947No error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.434602022 CET1.1.1.1192.168.2.50x3947No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.555531025 CET1.1.1.1192.168.2.50xffb5No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.575722933 CET1.1.1.1192.168.2.50xd166No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.248810053 CET1.1.1.1192.168.2.50x124cNo error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.248810053 CET1.1.1.1192.168.2.50x124cNo error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.248810053 CET1.1.1.1192.168.2.50x124cNo error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.387620926 CET1.1.1.1192.168.2.50x4e9No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.394903898 CET1.1.1.1192.168.2.50x583fNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com172.217.19.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com172.217.17.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com142.250.181.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com172.217.17.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com142.250.181.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com142.250.181.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com172.217.19.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com172.217.21.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268467903 CET1.1.1.1192.168.2.50x7b54No error (0)youtube-ui.l.google.com216.58.208.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268630981 CET1.1.1.1192.168.2.50x7fb5No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.268630981 CET1.1.1.1192.168.2.50x7fb5No error (0)star-mini.c10r.facebook.com157.240.196.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.270656109 CET1.1.1.1192.168.2.50xa723No error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.270656109 CET1.1.1.1192.168.2.50xa723No error (0)dyna.wikimedia.org185.15.58.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406543970 CET1.1.1.1192.168.2.50x6be9No error (0)star-mini.c10r.facebook.com157.240.196.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com172.217.21.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com172.217.19.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com142.250.181.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com142.250.181.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com172.217.17.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com172.217.17.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com172.217.19.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com142.250.181.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.406757116 CET1.1.1.1192.168.2.50x30d4No error (0)youtube-ui.l.google.com216.58.208.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.408628941 CET1.1.1.1192.168.2.50x45baNo error (0)dyna.wikimedia.org185.15.58.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544605970 CET1.1.1.1192.168.2.50xc904No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544622898 CET1.1.1.1192.168.2.50x40c6No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544622898 CET1.1.1.1192.168.2.50x40c6No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544622898 CET1.1.1.1192.168.2.50x40c6No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.544622898 CET1.1.1.1192.168.2.50x40c6No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.547554016 CET1.1.1.1192.168.2.50x3cafNo error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.683075905 CET1.1.1.1192.168.2.50x5274No error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.766462088 CET1.1.1.1192.168.2.50x2275No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.766462088 CET1.1.1.1192.168.2.50x2275No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.766462088 CET1.1.1.1192.168.2.50x2275No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.766462088 CET1.1.1.1192.168.2.50x2275No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.766462088 CET1.1.1.1192.168.2.50x2275No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.820998907 CET1.1.1.1192.168.2.50xfd3aNo error (0)twitter.com104.244.42.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906178951 CET1.1.1.1192.168.2.50xbfecNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906178951 CET1.1.1.1192.168.2.50xbfecNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906178951 CET1.1.1.1192.168.2.50xbfecNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:24.906178951 CET1.1.1.1192.168.2.50xbfecNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.308466911 CET1.1.1.1192.168.2.50xb1f6No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.308466911 CET1.1.1.1192.168.2.50xb1f6No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.274521112 CET1.1.1.1192.168.2.50x4601No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.274521112 CET1.1.1.1192.168.2.50x4601No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.344840050 CET1.1.1.1192.168.2.50x83c3No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.344840050 CET1.1.1.1192.168.2.50x83c3No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.344840050 CET1.1.1.1192.168.2.50x83c3No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.344840050 CET1.1.1.1192.168.2.50x83c3No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.495656013 CET1.1.1.1192.168.2.50x8d8bNo error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.495656013 CET1.1.1.1192.168.2.50x8d8bNo error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.495656013 CET1.1.1.1192.168.2.50x8d8bNo error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.495656013 CET1.1.1.1192.168.2.50x8d8bNo error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.629307032 CET1.1.1.1192.168.2.50x708No error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.629307032 CET1.1.1.1192.168.2.50x708No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.745641947 CET1.1.1.1192.168.2.50xb38bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.745641947 CET1.1.1.1192.168.2.50xb38bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.745641947 CET1.1.1.1192.168.2.50xb38bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.745641947 CET1.1.1.1192.168.2.50xb38bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:43.769942045 CET1.1.1.1192.168.2.50x7eaNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.067384005 CET1.1.1.1192.168.2.50x2391No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.067384005 CET1.1.1.1192.168.2.50x2391No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.526211977 CET1.1.1.1192.168.2.50xbd09No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.526211977 CET1.1.1.1192.168.2.50xbd09No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:02.462692022 CET1.1.1.1192.168.2.50x60c9No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:13.283622026 CET1.1.1.1192.168.2.50xc931No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.918889046 CET1.1.1.1192.168.2.50x1cdNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.918889046 CET1.1.1.1192.168.2.50x1cdNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                                                                  • detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                                                                  0192.168.2.54971334.107.221.82802752C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:15.448630095 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:16.580240965 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:38:12 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 66004
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                                                                  1192.168.2.54971934.107.221.82802752C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.012217045 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.068811893 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31459
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success


                                                                                                                                                                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                                                                  2192.168.2.54972334.107.221.82802752C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:17.369734049 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.457251072 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65451
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.501179934 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.815882921 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65451
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.185745001 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.500622988 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65455
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:27.979866982 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.294363022 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.308578968 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65461
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.247886896 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:29.562527895 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65462
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.710261106 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.025007010 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65463
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.594571114 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.909624100 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65468
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:41.982938051 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.299257040 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65475
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.442853928 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.761296034 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65477
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.900257111 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.215383053 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65478
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.898252010 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.213217020 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65479
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:56.220026016 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:03.731728077 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.046827078 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65496
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.054670095 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.515683889 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.830702066 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65507
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:24.832911968 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:34.961611986 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.091170073 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.781738043 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.096350908 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Sun, 24 Nov 2024 17:47:27 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 65538
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:56.107038975 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:06.236171007 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:16.364757061 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:


                                                                                                                                                                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                                                                  3192.168.2.54972934.107.221.82802752C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:18.626596928 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache


                                                                                                                                                                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                                                                  4192.168.2.54973334.107.221.82802752C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:19.148930073 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:20.327466011 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31462
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:22.676481962 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:23.009135962 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31464
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.560029030 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:28.892978907 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31470
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:30.703111887 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.036300898 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31472
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.569804907 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:31.902333021 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31473
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:35.913136005 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:36.245687962 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31478
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.302508116 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:42.636177063 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31484
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:44.764455080 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.097101927 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31486
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.218528986 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:45.551477909 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31487
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.216188908 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:46.549041986 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31488
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:58:56.552175045 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.049794912 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:04.382590055 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31506
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.386821985 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:14.833853960 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:15.166661024 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31517
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:25.186176062 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:35.315968990 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:45.445489883 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.104618073 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:46.438611031 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                                                                  Date: Mon, 25 Nov 2024 03:13:58 GMT
                                                                                                                                                                                                                                                                                                                                                                                                  Age: 31548
                                                                                                                                                                                                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 12:59:56.439172983 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:06.568146944 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                                                                                                                                                                                                  Nov 25, 2024 13:00:16.997706890 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                                                                  Data Ascii:


                                                                                                                                                                                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                                                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                                                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:0
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:07
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x790000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:922'624 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:DA7A7D753DEE0257505654E753E7ADEA
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:1
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:08
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0xe20000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:2
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:08
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:4
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0xe20000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:5
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:6
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0xe20000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:7
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:8
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0xe20000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:9
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0xe20000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:11
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:10
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:12
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:11
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:13
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:11
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:14
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:11
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:16
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:12
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {647ccd71-570b-4ec6-9efb-49c2bc0fae2b} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b434a6dd10 socket
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:17
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:13
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4492 -parentBuildID 20230927232528 -prefsHandle 4484 -prefMapHandle 4480 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69ecc336-1658-46c0-bf13-e6d8ee36fde7} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b44571ce10 rdd
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                                                                                                                                                                                                  Target ID:18
                                                                                                                                                                                                                                                                                                                                                                                                  Start time:06:58:17
                                                                                                                                                                                                                                                                                                                                                                                                  Start date:25/11/2024
                                                                                                                                                                                                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5060 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b99be95-6a32-4891-a374-7f066e98cf3f} 2752 "\\.\pipe\gecko-crash-server-pipe.2752" 2b446b75b10 utility
                                                                                                                                                                                                                                                                                                                                                                                                  Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                                                                                                                                                                                                  Reset < >

                                                                                                                                                                                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                                                                                                                                                                                    Execution Coverage:2.1%
                                                                                                                                                                                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                                                                                                                                                                    Signature Coverage:4.4%
                                                                                                                                                                                                                                                                                                                                                                                                    Total number of Nodes:1558
                                                                                                                                                                                                                                                                                                                                                                                                    Total number of Limit Nodes:63
                                                                                                                                                                                                                                                                                                                                                                                                    execution_graph 94737 7b03fb 94738 7b0407 CallCatchBlock 94737->94738 94766 7afeb1 94738->94766 94740 7b040e 94741 7b0561 94740->94741 94744 7b0438 94740->94744 94796 7b083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 94741->94796 94743 7b0568 94789 7b4e52 94743->94789 94753 7b0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 94744->94753 94777 7c247d 94744->94777 94751 7b0457 94756 7b04d8 94753->94756 94792 7b4e1a 38 API calls 3 library calls 94753->94792 94785 7b0959 94756->94785 94757 7b04de 94758 7b04f3 94757->94758 94793 7b0992 GetModuleHandleW 94758->94793 94760 7b04fa 94760->94743 94761 7b04fe 94760->94761 94762 7b0507 94761->94762 94794 7b4df5 28 API calls _abort 94761->94794 94795 7b0040 13 API calls 2 library calls 94762->94795 94765 7b050f 94765->94751 94767 7afeba 94766->94767 94798 7b0698 IsProcessorFeaturePresent 94767->94798 94769 7afec6 94799 7b2c94 10 API calls 3 library calls 94769->94799 94771 7afecb 94776 7afecf 94771->94776 94800 7c2317 94771->94800 94774 7afee6 94774->94740 94776->94740 94780 7c2494 94777->94780 94778 7b0a8c _ValidateLocalCookies 5 API calls 94779 7b0451 94778->94779 94779->94751 94781 7c2421 94779->94781 94780->94778 94782 7c2450 94781->94782 94783 7b0a8c _ValidateLocalCookies 5 API calls 94782->94783 94784 7c2479 94783->94784 94784->94753 94875 7b2340 94785->94875 94788 7b097f 94788->94757 94877 7b4bcf 94789->94877 94792->94756 94793->94760 94794->94762 94795->94765 94796->94743 94798->94769 94799->94771 94804 7cd1f6 94800->94804 94803 7b2cbd 8 API calls 3 library calls 94803->94776 94805 7cd213 94804->94805 94808 7cd20f 94804->94808 94805->94808 94810 7c4bfb 94805->94810 94807 7afed8 94807->94774 94807->94803 94822 7b0a8c 94808->94822 94811 7c4c07 CallCatchBlock 94810->94811 94829 7c2f5e EnterCriticalSection 94811->94829 94813 7c4c0e 94830 7c50af 94813->94830 94815 7c4c1d 94816 7c4c2c 94815->94816 94843 7c4a8f 29 API calls 94815->94843 94845 7c4c48 LeaveCriticalSection _abort 94816->94845 94819 7c4c3d __fread_nolock 94819->94805 94820 7c4c27 94844 7c4b45 GetStdHandle GetFileType 94820->94844 94823 7b0a97 IsProcessorFeaturePresent 94822->94823 94824 7b0a95 94822->94824 94826 7b0c5d 94823->94826 94824->94807 94874 7b0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94826->94874 94828 7b0d40 94828->94807 94829->94813 94831 7c50bb CallCatchBlock 94830->94831 94832 7c50df 94831->94832 94833 7c50c8 94831->94833 94846 7c2f5e EnterCriticalSection 94832->94846 94854 7bf2d9 20 API calls _free 94833->94854 94836 7c50cd 94855 7c27ec 26 API calls ___std_exception_copy 94836->94855 94838 7c5117 94856 7c513e LeaveCriticalSection _abort 94838->94856 94839 7c50d7 __fread_nolock 94839->94815 94840 7c50eb 94840->94838 94847 7c5000 94840->94847 94843->94820 94844->94816 94845->94819 94846->94840 94857 7c4c7d 94847->94857 94849 7c5012 94853 7c501f 94849->94853 94864 7c3405 11 API calls 2 library calls 94849->94864 94852 7c5071 94852->94840 94865 7c29c8 94853->94865 94854->94836 94855->94839 94856->94839 94858 7c4c8a _free 94857->94858 94859 7c4cca 94858->94859 94860 7c4cb5 RtlAllocateHeap 94858->94860 94871 7b4ead 7 API calls 2 library calls 94858->94871 94872 7bf2d9 20 API calls _free 94859->94872 94860->94858 94862 7c4cc8 94860->94862 94862->94849 94864->94849 94866 7c29d3 RtlFreeHeap 94865->94866 94870 7c29fc _free 94865->94870 94867 7c29e8 94866->94867 94866->94870 94873 7bf2d9 20 API calls _free 94867->94873 94869 7c29ee GetLastError 94869->94870 94870->94852 94871->94858 94872->94862 94873->94869 94874->94828 94876 7b096c GetStartupInfoW 94875->94876 94876->94788 94878 7b4bdb pair 94877->94878 94879 7b4be2 94878->94879 94880 7b4bf4 94878->94880 94916 7b4d29 GetModuleHandleW 94879->94916 94901 7c2f5e EnterCriticalSection 94880->94901 94883 7b4be7 94883->94880 94917 7b4d6d GetModuleHandleExW 94883->94917 94887 7b4c70 94891 7b4c88 94887->94891 94897 7c2421 _abort 5 API calls 94887->94897 94889 7b4ce2 94925 7d1d29 5 API calls _ValidateLocalCookies 94889->94925 94890 7b4cb6 94908 7b4ce8 94890->94908 94892 7c2421 _abort 5 API calls 94891->94892 94898 7b4c99 94892->94898 94893 7b4bfb 94893->94887 94893->94898 94902 7c21a8 94893->94902 94897->94891 94905 7b4cd9 94898->94905 94901->94893 94926 7c1ee1 94902->94926 94945 7c2fa6 LeaveCriticalSection 94905->94945 94907 7b4cb2 94907->94889 94907->94890 94946 7c360c 94908->94946 94911 7b4d16 94914 7b4d6d _abort 8 API calls 94911->94914 94912 7b4cf6 GetPEB 94912->94911 94913 7b4d06 GetCurrentProcess TerminateProcess 94912->94913 94913->94911 94915 7b4d1e ExitProcess 94914->94915 94916->94883 94918 7b4dba 94917->94918 94919 7b4d97 GetProcAddress 94917->94919 94920 7b4dc9 94918->94920 94921 7b4dc0 FreeLibrary 94918->94921 94923 7b4dac 94919->94923 94922 7b0a8c _ValidateLocalCookies 5 API calls 94920->94922 94921->94920 94924 7b4bf3 94922->94924 94923->94918 94924->94880 94929 7c1e90 94926->94929 94928 7c1f05 94928->94887 94930 7c1e9c CallCatchBlock 94929->94930 94937 7c2f5e EnterCriticalSection 94930->94937 94932 7c1eaa 94938 7c1f31 94932->94938 94936 7c1ec8 __fread_nolock 94936->94928 94937->94932 94939 7c1f51 94938->94939 94942 7c1f59 94938->94942 94940 7b0a8c _ValidateLocalCookies 5 API calls 94939->94940 94941 7c1eb7 94940->94941 94944 7c1ed5 LeaveCriticalSection _abort 94941->94944 94942->94939 94943 7c29c8 _free 20 API calls 94942->94943 94943->94939 94944->94936 94945->94907 94947 7c3627 94946->94947 94948 7c3631 94946->94948 94950 7b0a8c _ValidateLocalCookies 5 API calls 94947->94950 94953 7c2fd7 5 API calls 2 library calls 94948->94953 94951 7b4cf2 94950->94951 94951->94911 94951->94912 94952 7c3648 94952->94947 94953->94952 94954 791098 94959 7942de 94954->94959 94958 7910a7 94980 79a961 94959->94980 94963 794342 94976 794378 94963->94976 94997 7993b2 94963->94997 94965 79436c 95001 7937a0 94965->95001 94966 79441b GetCurrentProcess IsWow64Process 94968 794437 94966->94968 94969 79444f LoadLibraryA 94968->94969 94970 7d3824 GetSystemInfo 94968->94970 94971 79449c GetSystemInfo 94969->94971 94972 794460 GetProcAddress 94969->94972 94973 794476 94971->94973 94972->94971 94975 794470 GetNativeSystemInfo 94972->94975 94977 79447a FreeLibrary 94973->94977 94978 79109d 94973->94978 94974 7d37df 94975->94973 94976->94966 94976->94974 94977->94978 94979 7b00a3 29 API calls __onexit 94978->94979 94979->94958 95005 7afe0b 94980->95005 94982 79a976 95015 7afddb 94982->95015 94984 7942f5 GetVersionExW 94985 796b57 94984->94985 94986 7d4ba1 94985->94986 94987 796b67 _wcslen 94985->94987 94988 7993b2 22 API calls 94986->94988 94990 796b7d 94987->94990 94991 796ba2 94987->94991 94989 7d4baa 94988->94989 94989->94989 95040 796f34 22 API calls 94990->95040 94992 7afddb 22 API calls 94991->94992 94994 796bae 94992->94994 94996 7afe0b 22 API calls 94994->94996 94995 796b85 __fread_nolock 94995->94963 94996->94995 94998 7993c9 __fread_nolock 94997->94998 94999 7993c0 94997->94999 94998->94965 94999->94998 95041 79aec9 94999->95041 95002 7937ae 95001->95002 95003 7993b2 22 API calls 95002->95003 95004 7937c2 95003->95004 95004->94976 95008 7afddb 95005->95008 95007 7afdfa 95007->94982 95008->95007 95011 7afdfc 95008->95011 95025 7bea0c 95008->95025 95032 7b4ead 7 API calls 2 library calls 95008->95032 95010 7b066d 95034 7b32a4 RaiseException 95010->95034 95011->95010 95033 7b32a4 RaiseException 95011->95033 95014 7b068a 95014->94982 95017 7afde0 95015->95017 95016 7bea0c ___std_exception_copy 21 API calls 95016->95017 95017->95016 95018 7afdfa 95017->95018 95021 7afdfc 95017->95021 95037 7b4ead 7 API calls 2 library calls 95017->95037 95018->94984 95020 7b066d 95039 7b32a4 RaiseException 95020->95039 95021->95020 95038 7b32a4 RaiseException 95021->95038 95024 7b068a 95024->94984 95031 7c3820 _free 95025->95031 95026 7c385e 95036 7bf2d9 20 API calls _free 95026->95036 95028 7c3849 RtlAllocateHeap 95029 7c385c 95028->95029 95028->95031 95029->95008 95031->95026 95031->95028 95035 7b4ead 7 API calls 2 library calls 95031->95035 95032->95008 95033->95010 95034->95014 95035->95031 95036->95029 95037->95017 95038->95020 95039->95024 95040->94995 95042 79aedc 95041->95042 95046 79aed9 __fread_nolock 95041->95046 95043 7afddb 22 API calls 95042->95043 95044 79aee7 95043->95044 95045 7afe0b 22 API calls 95044->95045 95045->95046 95046->94998 95047 79105b 95052 79344d 95047->95052 95049 79106a 95083 7b00a3 29 API calls __onexit 95049->95083 95051 791074 95053 79345d __wsopen_s 95052->95053 95054 79a961 22 API calls 95053->95054 95055 793513 95054->95055 95084 793a5a 95055->95084 95057 79351c 95091 793357 95057->95091 95064 79a961 22 API calls 95065 79354d 95064->95065 95112 79a6c3 95065->95112 95068 7d3176 RegQueryValueExW 95069 7d320c RegCloseKey 95068->95069 95070 7d3193 95068->95070 95072 793578 95069->95072 95082 7d321e _wcslen 95069->95082 95071 7afe0b 22 API calls 95070->95071 95073 7d31ac 95071->95073 95072->95049 95118 795722 95073->95118 95074 794c6d 22 API calls 95074->95082 95077 7d31d4 95078 796b57 22 API calls 95077->95078 95079 7d31ee messages 95078->95079 95079->95069 95081 79515f 22 API calls 95081->95082 95082->95072 95082->95074 95082->95081 95121 799cb3 95082->95121 95083->95051 95127 7d1f50 95084->95127 95087 799cb3 22 API calls 95088 793a8d 95087->95088 95129 793aa2 95088->95129 95090 793a97 95090->95057 95092 7d1f50 __wsopen_s 95091->95092 95093 793364 GetFullPathNameW 95092->95093 95094 793386 95093->95094 95095 796b57 22 API calls 95094->95095 95096 7933a4 95095->95096 95097 7933c6 95096->95097 95098 7933dd 95097->95098 95099 7d30bb 95097->95099 95139 7933ee 95098->95139 95100 7afddb 22 API calls 95099->95100 95103 7d30c5 _wcslen 95100->95103 95102 7933e8 95106 79515f 95102->95106 95104 7afe0b 22 API calls 95103->95104 95105 7d30fe __fread_nolock 95104->95105 95108 79516e 95106->95108 95111 79518f __fread_nolock 95106->95111 95107 7afddb 22 API calls 95109 793544 95107->95109 95110 7afe0b 22 API calls 95108->95110 95109->95064 95110->95111 95111->95107 95113 79a6dd 95112->95113 95114 793556 RegOpenKeyExW 95112->95114 95115 7afddb 22 API calls 95113->95115 95114->95068 95114->95072 95116 79a6e7 95115->95116 95117 7afe0b 22 API calls 95116->95117 95117->95114 95119 7afddb 22 API calls 95118->95119 95120 795734 RegQueryValueExW 95119->95120 95120->95077 95120->95079 95122 799cc2 _wcslen 95121->95122 95123 7afe0b 22 API calls 95122->95123 95124 799cea __fread_nolock 95123->95124 95125 7afddb 22 API calls 95124->95125 95126 799d00 95125->95126 95126->95082 95128 793a67 GetModuleFileNameW 95127->95128 95128->95087 95130 7d1f50 __wsopen_s 95129->95130 95131 793aaf GetFullPathNameW 95130->95131 95132 793ae9 95131->95132 95133 793ace 95131->95133 95135 79a6c3 22 API calls 95132->95135 95134 796b57 22 API calls 95133->95134 95136 793ada 95134->95136 95135->95136 95137 7937a0 22 API calls 95136->95137 95138 793ae6 95137->95138 95138->95090 95140 7933fe _wcslen 95139->95140 95141 7d311d 95140->95141 95142 793411 95140->95142 95143 7afddb 22 API calls 95141->95143 95149 79a587 95142->95149 95145 7d3127 95143->95145 95147 7afe0b 22 API calls 95145->95147 95146 79341e __fread_nolock 95146->95102 95148 7d3157 __fread_nolock 95147->95148 95150 79a59d 95149->95150 95153 79a598 __fread_nolock 95149->95153 95151 7afe0b 22 API calls 95150->95151 95152 7df80f 95150->95152 95151->95153 95152->95152 95153->95146 95154 79defc 95157 791d6f 95154->95157 95156 79df07 95158 791d8c 95157->95158 95166 791f6f 95158->95166 95160 791da6 95161 7d2759 95160->95161 95163 791e36 95160->95163 95164 791dc2 95160->95164 95170 80359c 82 API calls __wsopen_s 95161->95170 95163->95156 95164->95163 95169 79289a 23 API calls 95164->95169 95171 79ec40 95166->95171 95168 791f98 95168->95160 95169->95163 95170->95163 95190 79ec76 messages 95171->95190 95172 7b00a3 29 API calls pre_c_initialization 95172->95190 95173 79fef7 95188 79ed9d messages 95173->95188 95198 79a8c7 22 API calls __fread_nolock 95173->95198 95175 7afddb 22 API calls 95175->95190 95177 7e4600 95177->95188 95197 79a8c7 22 API calls __fread_nolock 95177->95197 95178 7e4b0b 95200 80359c 82 API calls __wsopen_s 95178->95200 95179 79a8c7 22 API calls 95179->95190 95185 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95185->95190 95186 79fbe3 95186->95188 95189 7e4bdc 95186->95189 95194 79f3ae messages 95186->95194 95187 79a961 22 API calls 95187->95190 95188->95168 95201 80359c 82 API calls __wsopen_s 95189->95201 95190->95172 95190->95173 95190->95175 95190->95177 95190->95178 95190->95179 95190->95185 95190->95186 95190->95187 95190->95188 95192 7e4beb 95190->95192 95193 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95190->95193 95190->95194 95195 7a01e0 348 API calls 2 library calls 95190->95195 95196 7a06a0 41 API calls messages 95190->95196 95202 80359c 82 API calls __wsopen_s 95192->95202 95193->95190 95194->95188 95199 80359c 82 API calls __wsopen_s 95194->95199 95195->95190 95196->95190 95197->95188 95198->95188 95199->95188 95200->95188 95201->95192 95202->95188 95203 79f7bf 95204 79f7d3 95203->95204 95205 79fcb6 95203->95205 95206 79fcc2 95204->95206 95208 7afddb 22 API calls 95204->95208 95297 79aceb 95205->95297 95209 79aceb 23 API calls 95206->95209 95210 79f7e5 95208->95210 95212 79fd3d 95209->95212 95210->95206 95211 79f83e 95210->95211 95210->95212 95236 79ed9d messages 95211->95236 95238 7a1310 95211->95238 95307 801155 22 API calls 95212->95307 95215 79fef7 95215->95236 95309 79a8c7 22 API calls __fread_nolock 95215->95309 95218 7e4600 95218->95236 95308 79a8c7 22 API calls __fread_nolock 95218->95308 95219 7e4b0b 95311 80359c 82 API calls __wsopen_s 95219->95311 95220 79a8c7 22 API calls 95235 79ec76 messages 95220->95235 95226 79fbe3 95228 7e4bdc 95226->95228 95226->95236 95237 79f3ae messages 95226->95237 95227 79a961 22 API calls 95227->95235 95312 80359c 82 API calls __wsopen_s 95228->95312 95229 7b00a3 29 API calls pre_c_initialization 95229->95235 95231 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95231->95235 95232 7e4beb 95313 80359c 82 API calls __wsopen_s 95232->95313 95233 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95233->95235 95234 7afddb 22 API calls 95234->95235 95235->95215 95235->95218 95235->95219 95235->95220 95235->95226 95235->95227 95235->95229 95235->95231 95235->95232 95235->95233 95235->95234 95235->95236 95235->95237 95295 7a01e0 348 API calls 2 library calls 95235->95295 95296 7a06a0 41 API calls messages 95235->95296 95237->95236 95310 80359c 82 API calls __wsopen_s 95237->95310 95239 7a17b0 95238->95239 95240 7a1376 95238->95240 95353 7b0242 5 API calls __Init_thread_wait 95239->95353 95242 7a1390 95240->95242 95243 7e6331 95240->95243 95314 7a1940 95242->95314 95357 81709c 348 API calls 95243->95357 95245 7a17ba 95250 799cb3 22 API calls 95245->95250 95252 7a17fb 95245->95252 95247 7e633d 95247->95235 95249 7a1940 9 API calls 95251 7a13b6 95249->95251 95256 7a17d4 95250->95256 95251->95252 95254 7a13ec 95251->95254 95253 7e6346 95252->95253 95255 7a182c 95252->95255 95358 80359c 82 API calls __wsopen_s 95253->95358 95254->95253 95278 7a1408 __fread_nolock 95254->95278 95257 79aceb 23 API calls 95255->95257 95354 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95256->95354 95259 7a1839 95257->95259 95355 7ad217 348 API calls 95259->95355 95262 7e636e 95359 80359c 82 API calls __wsopen_s 95262->95359 95263 7a152f 95265 7a153c 95263->95265 95266 7e63d1 95263->95266 95268 7a1940 9 API calls 95265->95268 95361 815745 54 API calls _wcslen 95266->95361 95269 7a1549 95268->95269 95272 7e64fa 95269->95272 95274 7a1940 9 API calls 95269->95274 95270 7afddb 22 API calls 95270->95278 95271 7afe0b 22 API calls 95271->95278 95282 7e6369 95272->95282 95363 80359c 82 API calls __wsopen_s 95272->95363 95273 7a1872 95356 7afaeb 23 API calls 95273->95356 95280 7a1563 95274->95280 95277 79ec40 348 API calls 95277->95278 95278->95259 95278->95262 95278->95263 95278->95270 95278->95271 95278->95277 95279 7e63b2 95278->95279 95278->95282 95360 80359c 82 API calls __wsopen_s 95279->95360 95280->95272 95285 7a15c7 messages 95280->95285 95362 79a8c7 22 API calls __fread_nolock 95280->95362 95282->95235 95284 7a1940 9 API calls 95284->95285 95285->95272 95285->95273 95285->95282 95285->95284 95287 7a167b messages 95285->95287 95324 805c5a 95285->95324 95329 821591 95285->95329 95332 81abf7 95285->95332 95337 81ab67 95285->95337 95340 81a2ea 95285->95340 95345 7af645 95285->95345 95286 7a171d 95286->95235 95287->95286 95352 7ace17 22 API calls messages 95287->95352 95295->95235 95296->95235 95298 79acf9 95297->95298 95306 79ad2a messages 95297->95306 95299 79ad55 95298->95299 95301 79ad01 messages 95298->95301 95299->95306 95560 79a8c7 22 API calls __fread_nolock 95299->95560 95302 7dfa48 95301->95302 95303 79ad21 95301->95303 95301->95306 95302->95306 95561 7ace17 22 API calls messages 95302->95561 95304 7dfa3a VariantClear 95303->95304 95303->95306 95304->95306 95306->95206 95307->95236 95308->95236 95309->95236 95310->95236 95311->95236 95312->95232 95313->95236 95315 7a195d 95314->95315 95316 7a1981 95314->95316 95323 7a13a0 95315->95323 95366 7b0242 5 API calls __Init_thread_wait 95315->95366 95364 7b0242 5 API calls __Init_thread_wait 95316->95364 95318 7a198b 95318->95315 95365 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95318->95365 95321 7a8727 95321->95323 95367 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95321->95367 95323->95249 95368 797510 95324->95368 95328 805c77 95328->95285 95400 822ad8 95329->95400 95331 82159f 95331->95285 95411 81aff9 95332->95411 95334 81ac54 95334->95285 95335 81ac0c 95335->95334 95336 79aceb 23 API calls 95335->95336 95336->95334 95338 81aff9 217 API calls 95337->95338 95339 81ab79 95338->95339 95339->95285 95341 797510 53 API calls 95340->95341 95342 81a306 95341->95342 95539 7fd4dc CreateToolhelp32Snapshot Process32FirstW 95342->95539 95344 81a315 95344->95285 95346 79b567 39 API calls 95345->95346 95347 7af659 95346->95347 95348 7ef2dc Sleep 95347->95348 95349 7af661 timeGetTime 95347->95349 95350 79b567 39 API calls 95349->95350 95351 7af677 95350->95351 95351->95285 95352->95287 95353->95245 95354->95252 95355->95273 95356->95273 95357->95247 95358->95282 95359->95282 95360->95282 95361->95280 95362->95285 95363->95282 95364->95318 95365->95315 95366->95321 95367->95323 95369 797525 95368->95369 95385 797522 95368->95385 95370 79755b 95369->95370 95371 79752d 95369->95371 95374 79756d 95370->95374 95381 7d50f6 95370->95381 95383 7d500f 95370->95383 95396 7b51c6 26 API calls 95371->95396 95397 7afb21 51 API calls 95374->95397 95375 7d510e 95375->95375 95377 79753d 95378 7afddb 22 API calls 95377->95378 95380 797547 95378->95380 95382 799cb3 22 API calls 95380->95382 95399 7b5183 26 API calls 95381->95399 95382->95385 95384 7afe0b 22 API calls 95383->95384 95390 7d5088 95383->95390 95386 7d5058 95384->95386 95391 7fdbbe lstrlenW 95385->95391 95387 7afddb 22 API calls 95386->95387 95388 7d507f 95387->95388 95389 799cb3 22 API calls 95388->95389 95389->95390 95398 7afb21 51 API calls 95390->95398 95392 7fdbdc GetFileAttributesW 95391->95392 95393 7fdc06 95391->95393 95392->95393 95394 7fdbe8 FindFirstFileW 95392->95394 95393->95328 95394->95393 95395 7fdbf9 FindClose 95394->95395 95395->95393 95396->95377 95397->95377 95398->95381 95399->95375 95401 79aceb 23 API calls 95400->95401 95402 822af3 95401->95402 95403 822aff 95402->95403 95404 822b1d 95402->95404 95405 797510 53 API calls 95403->95405 95406 796b57 22 API calls 95404->95406 95407 822b0c 95405->95407 95408 822b1b 95406->95408 95407->95408 95410 79a8c7 22 API calls __fread_nolock 95407->95410 95408->95331 95410->95408 95412 81b01d ___scrt_fastfail 95411->95412 95413 81b094 95412->95413 95414 81b058 95412->95414 95418 79b567 39 API calls 95413->95418 95419 81b08b 95413->95419 95509 79b567 95414->95509 95416 81b063 95416->95419 95422 79b567 39 API calls 95416->95422 95417 81b0ed 95420 797510 53 API calls 95417->95420 95421 81b0a5 95418->95421 95419->95417 95423 79b567 39 API calls 95419->95423 95424 81b10b 95420->95424 95425 79b567 39 API calls 95421->95425 95426 81b078 95422->95426 95423->95417 95502 797620 95424->95502 95425->95419 95428 79b567 39 API calls 95426->95428 95428->95419 95429 81b115 95430 81b1d8 95429->95430 95431 81b11f 95429->95431 95433 81b20a GetCurrentDirectoryW 95430->95433 95436 797510 53 API calls 95430->95436 95432 797510 53 API calls 95431->95432 95434 81b130 95432->95434 95435 7afe0b 22 API calls 95433->95435 95437 797620 22 API calls 95434->95437 95438 81b22f GetCurrentDirectoryW 95435->95438 95439 81b1ef 95436->95439 95440 81b13a 95437->95440 95441 81b23c 95438->95441 95442 797620 22 API calls 95439->95442 95443 797510 53 API calls 95440->95443 95446 81b275 95441->95446 95514 799c6e 22 API calls 95441->95514 95444 81b1f9 _wcslen 95442->95444 95445 81b14b 95443->95445 95444->95433 95444->95446 95447 797620 22 API calls 95445->95447 95453 81b287 95446->95453 95454 81b28b 95446->95454 95449 81b155 95447->95449 95451 797510 53 API calls 95449->95451 95450 81b255 95515 799c6e 22 API calls 95450->95515 95456 81b166 95451->95456 95459 81b2f8 95453->95459 95460 81b39a CreateProcessW 95453->95460 95517 8007c0 10 API calls 95454->95517 95461 797620 22 API calls 95456->95461 95457 81b265 95516 799c6e 22 API calls 95457->95516 95458 81b294 95518 8006e6 10 API calls 95458->95518 95520 7f11c8 39 API calls 95459->95520 95501 81b32f _wcslen 95460->95501 95465 81b170 95461->95465 95468 81b1a6 GetSystemDirectoryW 95465->95468 95473 797510 53 API calls 95465->95473 95466 81b2aa 95519 8005a7 8 API calls 95466->95519 95467 81b2fd 95471 81b323 95467->95471 95472 81b32a 95467->95472 95470 7afe0b 22 API calls 95468->95470 95476 81b1cb GetSystemDirectoryW 95470->95476 95521 7f1201 128 API calls 2 library calls 95471->95521 95522 7f14ce 6 API calls 95472->95522 95478 81b187 95473->95478 95475 81b2d0 95475->95453 95476->95441 95479 797620 22 API calls 95478->95479 95481 81b191 _wcslen 95479->95481 95480 81b328 95480->95501 95481->95441 95481->95468 95482 81b3d6 GetLastError 95491 81b41a 95482->95491 95483 81b42f CloseHandle 95484 81b43f 95483->95484 95492 81b49a 95483->95492 95485 81b451 95484->95485 95486 81b446 CloseHandle 95484->95486 95489 81b463 95485->95489 95490 81b458 CloseHandle 95485->95490 95486->95485 95488 81b4a6 95488->95491 95493 81b475 95489->95493 95494 81b46a CloseHandle 95489->95494 95490->95489 95506 800175 95491->95506 95492->95488 95497 81b4d2 CloseHandle 95492->95497 95523 8009d9 34 API calls 95493->95523 95494->95493 95497->95491 95499 81b486 95524 81b536 25 API calls 95499->95524 95501->95482 95501->95483 95501->95501 95503 79762a _wcslen 95502->95503 95504 7afe0b 22 API calls 95503->95504 95505 79763f 95504->95505 95505->95429 95525 80030f 95506->95525 95510 79b578 95509->95510 95511 79b57f 95509->95511 95510->95511 95538 7b62d1 39 API calls _strftime 95510->95538 95511->95416 95513 79b5c2 95513->95416 95514->95450 95515->95457 95516->95446 95517->95458 95518->95466 95519->95475 95520->95467 95521->95480 95522->95501 95523->95499 95524->95492 95526 800321 CloseHandle 95525->95526 95527 800329 95525->95527 95526->95527 95528 800336 95527->95528 95529 80032e CloseHandle 95527->95529 95530 800343 95528->95530 95531 80033b CloseHandle 95528->95531 95529->95528 95532 800350 95530->95532 95533 800348 CloseHandle 95530->95533 95531->95530 95534 800355 CloseHandle 95532->95534 95535 80035d 95532->95535 95533->95532 95534->95535 95536 800362 CloseHandle 95535->95536 95537 80017d 95535->95537 95536->95537 95537->95335 95538->95513 95549 7fdef7 95539->95549 95541 7fd5db CloseHandle 95541->95344 95542 7fd529 Process32NextW 95542->95541 95547 7fd522 95542->95547 95543 79a961 22 API calls 95543->95547 95544 799cb3 22 API calls 95544->95547 95547->95541 95547->95542 95547->95543 95547->95544 95555 79525f 22 API calls 95547->95555 95556 796350 22 API calls 95547->95556 95557 7ace60 41 API calls 95547->95557 95554 7fdf02 95549->95554 95550 7fdf19 95559 7b62fb 39 API calls _strftime 95550->95559 95553 7fdf1f 95553->95547 95554->95550 95554->95553 95558 7b63b2 GetStringTypeW _strftime 95554->95558 95555->95547 95556->95547 95557->95547 95558->95554 95559->95553 95560->95306 95561->95306 95562 791033 95567 794c91 95562->95567 95566 791042 95568 79a961 22 API calls 95567->95568 95569 794cff 95568->95569 95575 793af0 95569->95575 95572 794d9c 95573 791038 95572->95573 95578 7951f7 22 API calls __fread_nolock 95572->95578 95574 7b00a3 29 API calls __onexit 95573->95574 95574->95566 95579 793b1c 95575->95579 95578->95572 95580 793b0f 95579->95580 95581 793b29 95579->95581 95580->95572 95581->95580 95582 793b30 RegOpenKeyExW 95581->95582 95582->95580 95583 793b4a RegQueryValueExW 95582->95583 95584 793b6b 95583->95584 95585 793b80 RegCloseKey 95583->95585 95584->95585 95585->95580 95586 7e3f75 95597 7aceb1 95586->95597 95588 7e3f8b 95589 7e4006 95588->95589 95664 7ae300 23 API calls 95588->95664 95606 79bf40 95589->95606 95593 7e4052 95595 7e4a88 95593->95595 95666 80359c 82 API calls __wsopen_s 95593->95666 95594 7e3fe6 95594->95593 95665 801abf 22 API calls 95594->95665 95598 7acebf 95597->95598 95599 7aced2 95597->95599 95602 79aceb 23 API calls 95598->95602 95600 7aced7 95599->95600 95601 7acf05 95599->95601 95603 7afddb 22 API calls 95600->95603 95604 79aceb 23 API calls 95601->95604 95605 7acec9 95602->95605 95603->95605 95604->95605 95605->95588 95667 79adf0 95606->95667 95608 79bf9d 95609 79bfa9 95608->95609 95610 7e04b6 95608->95610 95612 7e04c6 95609->95612 95613 79c01e 95609->95613 95685 80359c 82 API calls __wsopen_s 95610->95685 95686 80359c 82 API calls __wsopen_s 95612->95686 95672 79ac91 95613->95672 95616 7e04f5 95619 7e055a 95616->95619 95687 7ad217 348 API calls 95616->95687 95617 79c7da 95623 7afe0b 22 API calls 95617->95623 95618 7f7120 22 API calls 95625 79c039 __fread_nolock messages 95618->95625 95650 79c603 95619->95650 95688 80359c 82 API calls __wsopen_s 95619->95688 95628 79c808 __fread_nolock 95623->95628 95625->95616 95625->95617 95625->95618 95625->95619 95625->95628 95629 7afddb 22 API calls 95625->95629 95630 79ec40 348 API calls 95625->95630 95631 79af8a 22 API calls 95625->95631 95632 7e091a 95625->95632 95636 7e08a5 95625->95636 95640 7e0591 95625->95640 95643 7e08f6 95625->95643 95646 79c237 95625->95646 95647 79aceb 23 API calls 95625->95647 95625->95650 95656 7e09bf 95625->95656 95659 79bbe0 40 API calls 95625->95659 95662 7afe0b 22 API calls 95625->95662 95676 79ad81 95625->95676 95690 7f7099 22 API calls __fread_nolock 95625->95690 95691 815745 54 API calls _wcslen 95625->95691 95692 7aaa42 22 API calls messages 95625->95692 95693 7ff05c 40 API calls 95625->95693 95694 79a993 41 API calls 95625->95694 95633 7afe0b 22 API calls 95628->95633 95629->95625 95630->95625 95631->95625 95697 803209 23 API calls 95632->95697 95661 79c350 __fread_nolock messages 95633->95661 95637 79ec40 348 API calls 95636->95637 95639 7e08cf 95637->95639 95639->95650 95695 79a81b 41 API calls 95639->95695 95689 80359c 82 API calls __wsopen_s 95640->95689 95696 80359c 82 API calls __wsopen_s 95643->95696 95648 79c253 95646->95648 95698 79a8c7 22 API calls __fread_nolock 95646->95698 95647->95625 95651 7e0976 95648->95651 95654 79c297 messages 95648->95654 95650->95593 95653 79aceb 23 API calls 95651->95653 95653->95656 95655 79aceb 23 API calls 95654->95655 95654->95656 95657 79c335 95655->95657 95656->95650 95699 80359c 82 API calls __wsopen_s 95656->95699 95657->95656 95658 79c342 95657->95658 95683 79a704 22 API calls messages 95658->95683 95659->95625 95663 79c3ac 95661->95663 95684 7ace17 22 API calls messages 95661->95684 95662->95625 95663->95593 95664->95594 95665->95589 95666->95595 95668 79ae01 95667->95668 95671 79ae1c messages 95667->95671 95669 79aec9 22 API calls 95668->95669 95670 79ae09 CharUpperBuffW 95669->95670 95670->95671 95671->95608 95673 79acae 95672->95673 95674 79acd1 95673->95674 95700 80359c 82 API calls __wsopen_s 95673->95700 95674->95625 95677 7dfadb 95676->95677 95678 79ad92 95676->95678 95679 7afddb 22 API calls 95678->95679 95680 79ad99 95679->95680 95701 79adcd 95680->95701 95683->95661 95684->95661 95685->95612 95686->95650 95687->95619 95688->95650 95689->95650 95690->95625 95691->95625 95692->95625 95693->95625 95694->95625 95695->95643 95696->95650 95697->95646 95698->95648 95699->95650 95700->95674 95705 79addd 95701->95705 95702 79adb6 95702->95625 95703 7afddb 22 API calls 95703->95705 95704 79a961 22 API calls 95704->95705 95705->95702 95705->95703 95705->95704 95707 79adcd 22 API calls 95705->95707 95708 79a8c7 22 API calls __fread_nolock 95705->95708 95707->95705 95708->95705 95709 792e37 95710 79a961 22 API calls 95709->95710 95711 792e4d 95710->95711 95788 794ae3 95711->95788 95713 792e6b 95714 793a5a 24 API calls 95713->95714 95715 792e7f 95714->95715 95716 799cb3 22 API calls 95715->95716 95717 792e8c 95716->95717 95802 794ecb 95717->95802 95720 792ead 95824 79a8c7 22 API calls __fread_nolock 95720->95824 95721 7d2cb0 95842 802cf9 95721->95842 95723 7d2cc3 95725 7d2ccf 95723->95725 95868 794f39 95723->95868 95729 794f39 68 API calls 95725->95729 95726 792ec3 95825 796f88 22 API calls 95726->95825 95731 7d2ce5 95729->95731 95730 792ecf 95732 799cb3 22 API calls 95730->95732 95874 793084 22 API calls 95731->95874 95733 792edc 95732->95733 95826 79a81b 41 API calls 95733->95826 95736 792eec 95738 799cb3 22 API calls 95736->95738 95737 7d2d02 95875 793084 22 API calls 95737->95875 95740 792f12 95738->95740 95827 79a81b 41 API calls 95740->95827 95741 7d2d1e 95743 793a5a 24 API calls 95741->95743 95745 7d2d44 95743->95745 95744 792f21 95748 79a961 22 API calls 95744->95748 95876 793084 22 API calls 95745->95876 95747 7d2d50 95877 79a8c7 22 API calls __fread_nolock 95747->95877 95750 792f3f 95748->95750 95828 793084 22 API calls 95750->95828 95751 7d2d5e 95878 793084 22 API calls 95751->95878 95754 792f4b 95829 7b4a28 40 API calls 3 library calls 95754->95829 95756 792f59 95756->95731 95758 792f63 95756->95758 95757 7d2d6d 95879 79a8c7 22 API calls __fread_nolock 95757->95879 95830 7b4a28 40 API calls 3 library calls 95758->95830 95761 7d2d83 95880 793084 22 API calls 95761->95880 95762 792f6e 95762->95737 95764 792f78 95762->95764 95831 7b4a28 40 API calls 3 library calls 95764->95831 95765 7d2d90 95767 792f83 95767->95741 95768 792f8d 95767->95768 95832 7b4a28 40 API calls 3 library calls 95768->95832 95770 792f98 95771 792fdc 95770->95771 95833 793084 22 API calls 95770->95833 95771->95757 95772 792fe8 95771->95772 95772->95765 95836 7963eb 22 API calls 95772->95836 95774 792fbf 95834 79a8c7 22 API calls __fread_nolock 95774->95834 95776 792ff8 95837 796a50 22 API calls 95776->95837 95779 792fcd 95835 793084 22 API calls 95779->95835 95780 793006 95838 7970b0 23 API calls 95780->95838 95785 793021 95786 793065 95785->95786 95839 796f88 22 API calls 95785->95839 95840 7970b0 23 API calls 95785->95840 95841 793084 22 API calls 95785->95841 95789 794af0 __wsopen_s 95788->95789 95790 796b57 22 API calls 95789->95790 95791 794b22 95789->95791 95790->95791 95801 794b58 95791->95801 95881 794c6d 95791->95881 95793 794c6d 22 API calls 95793->95801 95794 799cb3 22 API calls 95796 794c52 95794->95796 95795 799cb3 22 API calls 95795->95801 95797 79515f 22 API calls 95796->95797 95799 794c5e 95797->95799 95798 79515f 22 API calls 95798->95801 95799->95713 95800 794c29 95800->95794 95800->95799 95801->95793 95801->95795 95801->95798 95801->95800 95884 794e90 LoadLibraryA 95802->95884 95807 7d3ccf 95809 794f39 68 API calls 95807->95809 95808 794ef6 LoadLibraryExW 95892 794e59 LoadLibraryA 95808->95892 95811 7d3cd6 95809->95811 95814 794e59 3 API calls 95811->95814 95816 7d3cde 95814->95816 95815 794f20 95815->95816 95817 794f2c 95815->95817 95914 7950f5 40 API calls __fread_nolock 95816->95914 95818 794f39 68 API calls 95817->95818 95820 792ea5 95818->95820 95820->95720 95820->95721 95821 7d3cf5 95915 8028fe 27 API calls 95821->95915 95823 7d3d05 95824->95726 95825->95730 95826->95736 95827->95744 95828->95754 95829->95756 95830->95762 95831->95767 95832->95770 95833->95774 95834->95779 95835->95771 95836->95776 95837->95780 95838->95785 95839->95785 95840->95785 95841->95785 95843 802d15 95842->95843 95979 79511f 64 API calls 95843->95979 95845 802d29 95980 802e66 75 API calls 95845->95980 95847 802d3b 95865 802d3f 95847->95865 95981 7950f5 40 API calls __fread_nolock 95847->95981 95849 802d56 95982 7950f5 40 API calls __fread_nolock 95849->95982 95851 802d66 95983 7950f5 40 API calls __fread_nolock 95851->95983 95853 802d81 95984 7950f5 40 API calls __fread_nolock 95853->95984 95855 802d9c 95985 79511f 64 API calls 95855->95985 95857 802db3 95858 7bea0c ___std_exception_copy 21 API calls 95857->95858 95859 802dba 95858->95859 95860 7bea0c ___std_exception_copy 21 API calls 95859->95860 95861 802dc4 95860->95861 95986 7950f5 40 API calls __fread_nolock 95861->95986 95863 802dd8 95987 8028fe 27 API calls 95863->95987 95865->95723 95866 802dee 95866->95865 95988 8022ce 95866->95988 95869 794f4a 95868->95869 95870 794f43 95868->95870 95872 794f59 95869->95872 95873 794f6a FreeLibrary 95869->95873 95871 7be678 67 API calls 95870->95871 95871->95869 95872->95725 95873->95872 95874->95737 95875->95741 95876->95747 95877->95751 95878->95757 95879->95761 95880->95765 95882 79aec9 22 API calls 95881->95882 95883 794c78 95882->95883 95883->95791 95885 794ea8 GetProcAddress 95884->95885 95886 794ec6 95884->95886 95887 794eb8 95885->95887 95889 7be5eb 95886->95889 95887->95886 95888 794ebf FreeLibrary 95887->95888 95888->95886 95916 7be52a 95889->95916 95891 794eea 95891->95807 95891->95808 95893 794e8d 95892->95893 95894 794e6e GetProcAddress 95892->95894 95897 794f80 95893->95897 95895 794e7e 95894->95895 95895->95893 95896 794e86 FreeLibrary 95895->95896 95896->95893 95898 7afe0b 22 API calls 95897->95898 95899 794f95 95898->95899 95900 795722 22 API calls 95899->95900 95901 794fa1 __fread_nolock 95900->95901 95902 7d3d1d 95901->95902 95903 7950a5 95901->95903 95908 794fdc 95901->95908 95976 80304d 74 API calls 95902->95976 95968 7942a2 CreateStreamOnHGlobal 95903->95968 95906 7d3d22 95977 79511f 64 API calls 95906->95977 95908->95906 95913 79506e messages 95908->95913 95974 7950f5 40 API calls __fread_nolock 95908->95974 95975 79511f 64 API calls 95908->95975 95910 7d3d45 95978 7950f5 40 API calls __fread_nolock 95910->95978 95913->95815 95914->95821 95915->95823 95919 7be536 CallCatchBlock 95916->95919 95917 7be544 95941 7bf2d9 20 API calls _free 95917->95941 95919->95917 95921 7be574 95919->95921 95920 7be549 95942 7c27ec 26 API calls ___std_exception_copy 95920->95942 95923 7be579 95921->95923 95924 7be586 95921->95924 95943 7bf2d9 20 API calls _free 95923->95943 95933 7c8061 95924->95933 95927 7be58f 95928 7be595 95927->95928 95930 7be5a2 95927->95930 95944 7bf2d9 20 API calls _free 95928->95944 95945 7be5d4 LeaveCriticalSection __fread_nolock 95930->95945 95932 7be554 __fread_nolock 95932->95891 95934 7c806d CallCatchBlock 95933->95934 95946 7c2f5e EnterCriticalSection 95934->95946 95936 7c807b 95947 7c80fb 95936->95947 95940 7c80ac __fread_nolock 95940->95927 95941->95920 95942->95932 95943->95932 95944->95932 95945->95932 95946->95936 95954 7c811e 95947->95954 95948 7c8177 95949 7c4c7d _free 20 API calls 95948->95949 95950 7c8180 95949->95950 95952 7c29c8 _free 20 API calls 95950->95952 95953 7c8189 95952->95953 95956 7c8088 95953->95956 95965 7c3405 11 API calls 2 library calls 95953->95965 95954->95948 95954->95954 95954->95956 95963 7b918d EnterCriticalSection 95954->95963 95964 7b91a1 LeaveCriticalSection 95954->95964 95960 7c80b7 95956->95960 95957 7c81a8 95966 7b918d EnterCriticalSection 95957->95966 95967 7c2fa6 LeaveCriticalSection 95960->95967 95962 7c80be 95962->95940 95963->95954 95964->95954 95965->95957 95966->95956 95967->95962 95969 7942d9 95968->95969 95970 7942bc FindResourceExW 95968->95970 95969->95908 95970->95969 95971 7d35ba LoadResource 95970->95971 95971->95969 95972 7d35cf SizeofResource 95971->95972 95972->95969 95973 7d35e3 LockResource 95972->95973 95973->95969 95974->95908 95975->95908 95976->95906 95977->95910 95978->95913 95979->95845 95980->95847 95981->95849 95982->95851 95983->95853 95984->95855 95985->95857 95986->95863 95987->95866 95989 8022e7 95988->95989 95990 8022d9 95988->95990 95992 80232c 95989->95992 95993 7be5eb 29 API calls 95989->95993 96003 8022f0 95989->96003 95991 7be5eb 29 API calls 95990->95991 95991->95989 96017 802557 40 API calls __fread_nolock 95992->96017 95994 802311 95993->95994 95994->95992 95996 80231a 95994->95996 95996->96003 96025 7be678 95996->96025 95997 802370 95998 802374 95997->95998 95999 802395 95997->95999 96002 802381 95998->96002 96005 7be678 67 API calls 95998->96005 96018 802171 95999->96018 96002->96003 96006 7be678 67 API calls 96002->96006 96003->95865 96004 80239d 96007 8023c3 96004->96007 96008 8023a3 96004->96008 96005->96002 96006->96003 96038 8023f3 74 API calls 96007->96038 96010 7be678 67 API calls 96008->96010 96011 8023b0 96008->96011 96010->96011 96011->96003 96013 7be678 67 API calls 96011->96013 96012 8023ca 96014 8023de 96012->96014 96015 7be678 67 API calls 96012->96015 96013->96003 96014->96003 96016 7be678 67 API calls 96014->96016 96015->96014 96016->96003 96017->95997 96019 7bea0c ___std_exception_copy 21 API calls 96018->96019 96020 80217f 96019->96020 96021 7bea0c ___std_exception_copy 21 API calls 96020->96021 96022 802190 96021->96022 96023 7bea0c ___std_exception_copy 21 API calls 96022->96023 96024 80219c 96023->96024 96024->96004 96026 7be684 CallCatchBlock 96025->96026 96027 7be6aa 96026->96027 96028 7be695 96026->96028 96036 7be6a5 __fread_nolock 96027->96036 96039 7b918d EnterCriticalSection 96027->96039 96056 7bf2d9 20 API calls _free 96028->96056 96030 7be69a 96057 7c27ec 26 API calls ___std_exception_copy 96030->96057 96032 7be6c6 96040 7be602 96032->96040 96035 7be6d1 96058 7be6ee LeaveCriticalSection __fread_nolock 96035->96058 96036->96003 96038->96012 96039->96032 96041 7be60f 96040->96041 96042 7be624 96040->96042 96091 7bf2d9 20 API calls _free 96041->96091 96048 7be61f 96042->96048 96059 7bdc0b 96042->96059 96044 7be614 96092 7c27ec 26 API calls ___std_exception_copy 96044->96092 96048->96035 96052 7be646 96076 7c862f 96052->96076 96055 7c29c8 _free 20 API calls 96055->96048 96056->96030 96057->96036 96058->96036 96060 7bdc23 96059->96060 96062 7bdc1f 96059->96062 96061 7bd955 __fread_nolock 26 API calls 96060->96061 96060->96062 96063 7bdc43 96061->96063 96065 7c4d7a 96062->96065 96093 7c59be 62 API calls 6 library calls 96063->96093 96066 7be640 96065->96066 96067 7c4d90 96065->96067 96069 7bd955 96066->96069 96067->96066 96068 7c29c8 _free 20 API calls 96067->96068 96068->96066 96070 7bd961 96069->96070 96071 7bd976 96069->96071 96094 7bf2d9 20 API calls _free 96070->96094 96071->96052 96073 7bd966 96095 7c27ec 26 API calls ___std_exception_copy 96073->96095 96075 7bd971 96075->96052 96077 7c863e 96076->96077 96078 7c8653 96076->96078 96099 7bf2c6 20 API calls _free 96077->96099 96080 7c868e 96078->96080 96085 7c867a 96078->96085 96101 7bf2c6 20 API calls _free 96080->96101 96082 7c8643 96100 7bf2d9 20 API calls _free 96082->96100 96083 7c8693 96102 7bf2d9 20 API calls _free 96083->96102 96096 7c8607 96085->96096 96088 7be64c 96088->96048 96088->96055 96089 7c869b 96103 7c27ec 26 API calls ___std_exception_copy 96089->96103 96091->96044 96092->96048 96093->96062 96094->96073 96095->96075 96104 7c8585 96096->96104 96098 7c862b 96098->96088 96099->96082 96100->96088 96101->96083 96102->96089 96103->96088 96105 7c8591 CallCatchBlock 96104->96105 96115 7c5147 EnterCriticalSection 96105->96115 96107 7c859f 96108 7c85c6 96107->96108 96109 7c85d1 96107->96109 96116 7c86ae 96108->96116 96131 7bf2d9 20 API calls _free 96109->96131 96112 7c85cc 96132 7c85fb LeaveCriticalSection __wsopen_s 96112->96132 96114 7c85ee __fread_nolock 96114->96098 96115->96107 96133 7c53c4 96116->96133 96118 7c86c4 96146 7c5333 21 API calls 3 library calls 96118->96146 96119 7c86be 96119->96118 96121 7c86f6 96119->96121 96124 7c53c4 __wsopen_s 26 API calls 96119->96124 96121->96118 96122 7c53c4 __wsopen_s 26 API calls 96121->96122 96125 7c8702 CloseHandle 96122->96125 96123 7c871c 96126 7c873e 96123->96126 96147 7bf2a3 20 API calls 2 library calls 96123->96147 96127 7c86ed 96124->96127 96125->96118 96128 7c870e GetLastError 96125->96128 96126->96112 96130 7c53c4 __wsopen_s 26 API calls 96127->96130 96128->96118 96130->96121 96131->96112 96132->96114 96134 7c53e6 96133->96134 96135 7c53d1 96133->96135 96140 7c540b 96134->96140 96150 7bf2c6 20 API calls _free 96134->96150 96148 7bf2c6 20 API calls _free 96135->96148 96137 7c53d6 96149 7bf2d9 20 API calls _free 96137->96149 96140->96119 96141 7c5416 96151 7bf2d9 20 API calls _free 96141->96151 96143 7c541e 96152 7c27ec 26 API calls ___std_exception_copy 96143->96152 96144 7c53de 96144->96119 96146->96123 96147->96126 96148->96137 96149->96144 96150->96141 96151->96143 96152->96144 96153 793156 96156 793170 96153->96156 96157 793187 96156->96157 96158 7931eb 96157->96158 96159 79318c 96157->96159 96200 7931e9 96157->96200 96161 7d2dfb 96158->96161 96162 7931f1 96158->96162 96163 793199 96159->96163 96164 793265 PostQuitMessage 96159->96164 96160 7931d0 DefWindowProcW 96170 79316a 96160->96170 96215 7918e2 10 API calls 96161->96215 96165 7931f8 96162->96165 96166 79321d SetTimer RegisterWindowMessageW 96162->96166 96168 7d2e7c 96163->96168 96169 7931a4 96163->96169 96164->96170 96171 7d2d9c 96165->96171 96172 793201 KillTimer 96165->96172 96166->96170 96174 793246 CreatePopupMenu 96166->96174 96228 7fbf30 34 API calls ___scrt_fastfail 96168->96228 96175 7d2e68 96169->96175 96176 7931ae 96169->96176 96184 7d2dd7 MoveWindow 96171->96184 96185 7d2da1 96171->96185 96201 7930f2 96172->96201 96173 7d2e1c 96216 7ae499 42 API calls 96173->96216 96174->96170 96205 7fc161 96175->96205 96181 7d2e4d 96176->96181 96182 7931b9 96176->96182 96181->96160 96227 7f0ad7 22 API calls 96181->96227 96189 7931c4 96182->96189 96190 793253 96182->96190 96183 7d2e8e 96183->96160 96183->96170 96184->96170 96186 7d2da7 96185->96186 96187 7d2dc6 SetFocus 96185->96187 96186->96189 96191 7d2db0 96186->96191 96187->96170 96189->96160 96197 7930f2 Shell_NotifyIconW 96189->96197 96213 79326f 44 API calls ___scrt_fastfail 96190->96213 96214 7918e2 10 API calls 96191->96214 96196 793263 96196->96170 96198 7d2e41 96197->96198 96217 793837 96198->96217 96200->96160 96202 793154 96201->96202 96203 793104 ___scrt_fastfail 96201->96203 96212 793c50 DeleteObject DestroyWindow 96202->96212 96204 793123 Shell_NotifyIconW 96203->96204 96204->96202 96206 7fc179 ___scrt_fastfail 96205->96206 96207 7fc276 96205->96207 96229 793923 96206->96229 96207->96170 96209 7fc25f KillTimer SetTimer 96209->96207 96210 7fc1a0 96210->96209 96211 7fc251 Shell_NotifyIconW 96210->96211 96211->96209 96212->96170 96213->96196 96214->96170 96215->96173 96216->96189 96218 793862 ___scrt_fastfail 96217->96218 96259 794212 96218->96259 96221 7938e8 96223 7d3386 Shell_NotifyIconW 96221->96223 96224 793906 Shell_NotifyIconW 96221->96224 96225 793923 24 API calls 96224->96225 96226 79391c 96225->96226 96226->96200 96227->96200 96228->96183 96230 79393f 96229->96230 96231 793a13 96229->96231 96251 796270 96230->96251 96231->96210 96234 79395a 96236 796b57 22 API calls 96234->96236 96235 7d3393 LoadStringW 96237 7d33ad 96235->96237 96238 79396f 96236->96238 96245 793994 ___scrt_fastfail 96237->96245 96257 79a8c7 22 API calls __fread_nolock 96237->96257 96239 7d33c9 96238->96239 96240 79397c 96238->96240 96258 796350 22 API calls 96239->96258 96240->96237 96242 793986 96240->96242 96256 796350 22 API calls 96242->96256 96248 7939f9 Shell_NotifyIconW 96245->96248 96246 7d33d7 96246->96245 96247 7933c6 22 API calls 96246->96247 96249 7d33f9 96247->96249 96248->96231 96250 7933c6 22 API calls 96249->96250 96250->96245 96252 7afe0b 22 API calls 96251->96252 96253 796295 96252->96253 96254 7afddb 22 API calls 96253->96254 96255 79394d 96254->96255 96255->96234 96255->96235 96256->96245 96257->96245 96258->96246 96260 7d35a4 96259->96260 96261 7938b7 96259->96261 96260->96261 96262 7d35ad DestroyIcon 96260->96262 96261->96221 96263 7fc874 42 API calls _strftime 96261->96263 96262->96261 96263->96221 96264 791cad SystemParametersInfoW 96265 822a55 96273 801ebc 96265->96273 96268 822a70 96275 7f39c0 22 API calls 96268->96275 96270 822a7c 96276 7f417d 22 API calls __fread_nolock 96270->96276 96272 822a87 96274 801ec3 IsWindow 96273->96274 96274->96268 96274->96272 96275->96270 96276->96272 96277 7d2ba5 96278 7d2baf 96277->96278 96279 792b25 96277->96279 96281 793a5a 24 API calls 96278->96281 96305 792b83 7 API calls 96279->96305 96283 7d2bb8 96281->96283 96285 799cb3 22 API calls 96283->96285 96287 7d2bc6 96285->96287 96286 792b2f 96288 792b44 96286->96288 96292 793837 49 API calls 96286->96292 96289 7d2bce 96287->96289 96290 7d2bf5 96287->96290 96296 792b5f 96288->96296 96299 7930f2 Shell_NotifyIconW 96288->96299 96293 7933c6 22 API calls 96289->96293 96291 7933c6 22 API calls 96290->96291 96304 7d2bf1 GetForegroundWindow ShellExecuteW 96291->96304 96292->96288 96294 7d2bd9 96293->96294 96309 796350 22 API calls 96294->96309 96302 792b66 SetCurrentDirectoryW 96296->96302 96298 7d2c26 96298->96296 96299->96296 96300 7d2be7 96301 7933c6 22 API calls 96300->96301 96301->96304 96303 792b7a 96302->96303 96304->96298 96310 792cd4 7 API calls 96305->96310 96307 792b2a 96308 792c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96307->96308 96308->96286 96309->96300 96310->96307 96311 792de3 96312 792df0 __wsopen_s 96311->96312 96313 792e09 96312->96313 96314 7d2c2b ___scrt_fastfail 96312->96314 96315 793aa2 23 API calls 96313->96315 96317 7d2c47 GetOpenFileNameW 96314->96317 96316 792e12 96315->96316 96327 792da5 96316->96327 96319 7d2c96 96317->96319 96320 796b57 22 API calls 96319->96320 96322 7d2cab 96320->96322 96322->96322 96324 792e27 96345 7944a8 96324->96345 96328 7d1f50 __wsopen_s 96327->96328 96329 792db2 GetLongPathNameW 96328->96329 96330 796b57 22 API calls 96329->96330 96331 792dda 96330->96331 96332 793598 96331->96332 96333 79a961 22 API calls 96332->96333 96334 7935aa 96333->96334 96335 793aa2 23 API calls 96334->96335 96336 7935b5 96335->96336 96337 7935c0 96336->96337 96342 7d32eb 96336->96342 96339 79515f 22 API calls 96337->96339 96340 7935cc 96339->96340 96375 7935f3 96340->96375 96343 7d330d 96342->96343 96381 7ace60 41 API calls 96342->96381 96344 7935df 96344->96324 96346 794ecb 94 API calls 96345->96346 96347 7944cd 96346->96347 96348 7d3833 96347->96348 96349 794ecb 94 API calls 96347->96349 96350 802cf9 80 API calls 96348->96350 96351 7944e1 96349->96351 96352 7d3848 96350->96352 96351->96348 96355 7944e9 96351->96355 96353 7d384c 96352->96353 96354 7d3869 96352->96354 96356 794f39 68 API calls 96353->96356 96357 7afe0b 22 API calls 96354->96357 96358 7d3854 96355->96358 96359 7944f5 96355->96359 96356->96358 96372 7d38ae 96357->96372 96383 7fda5a 82 API calls 96358->96383 96382 79940c 136 API calls 2 library calls 96359->96382 96362 7d3862 96362->96354 96363 792e31 96364 7d3a5f 96369 7d3a67 96364->96369 96365 794f39 68 API calls 96365->96369 96369->96365 96389 7f989b 82 API calls __wsopen_s 96369->96389 96371 799cb3 22 API calls 96371->96372 96372->96364 96372->96369 96372->96371 96384 7f967e 22 API calls __fread_nolock 96372->96384 96385 7f95ad 42 API calls _wcslen 96372->96385 96386 800b5a 22 API calls 96372->96386 96387 79a4a1 22 API calls __fread_nolock 96372->96387 96388 793ff7 22 API calls 96372->96388 96376 793605 96375->96376 96380 793624 __fread_nolock 96375->96380 96379 7afe0b 22 API calls 96376->96379 96377 7afddb 22 API calls 96378 79363b 96377->96378 96378->96344 96379->96380 96380->96377 96381->96342 96382->96363 96383->96362 96384->96372 96385->96372 96386->96372 96387->96372 96388->96372 96389->96369 96390 791044 96395 7910f3 96390->96395 96392 79104a 96431 7b00a3 29 API calls __onexit 96392->96431 96394 791054 96432 791398 96395->96432 96399 79116a 96400 79a961 22 API calls 96399->96400 96401 791174 96400->96401 96402 79a961 22 API calls 96401->96402 96403 79117e 96402->96403 96404 79a961 22 API calls 96403->96404 96405 791188 96404->96405 96406 79a961 22 API calls 96405->96406 96407 7911c6 96406->96407 96408 79a961 22 API calls 96407->96408 96409 791292 96408->96409 96442 79171c 96409->96442 96413 7912c4 96414 79a961 22 API calls 96413->96414 96415 7912ce 96414->96415 96416 7a1940 9 API calls 96415->96416 96417 7912f9 96416->96417 96463 791aab 96417->96463 96419 791315 96420 791325 GetStdHandle 96419->96420 96421 79137a 96420->96421 96422 7d2485 96420->96422 96426 791387 OleInitialize 96421->96426 96422->96421 96423 7d248e 96422->96423 96424 7afddb 22 API calls 96423->96424 96425 7d2495 96424->96425 96470 80011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96425->96470 96426->96392 96428 7d249e 96471 800944 CreateThread 96428->96471 96430 7d24aa CloseHandle 96430->96421 96431->96394 96472 7913f1 96432->96472 96435 7913f1 22 API calls 96436 7913d0 96435->96436 96437 79a961 22 API calls 96436->96437 96438 7913dc 96437->96438 96439 796b57 22 API calls 96438->96439 96440 791129 96439->96440 96441 791bc3 6 API calls 96440->96441 96441->96399 96443 79a961 22 API calls 96442->96443 96444 79172c 96443->96444 96445 79a961 22 API calls 96444->96445 96446 791734 96445->96446 96447 79a961 22 API calls 96446->96447 96448 79174f 96447->96448 96449 7afddb 22 API calls 96448->96449 96450 79129c 96449->96450 96451 791b4a 96450->96451 96452 791b58 96451->96452 96453 79a961 22 API calls 96452->96453 96454 791b63 96453->96454 96455 79a961 22 API calls 96454->96455 96456 791b6e 96455->96456 96457 79a961 22 API calls 96456->96457 96458 791b79 96457->96458 96459 79a961 22 API calls 96458->96459 96460 791b84 96459->96460 96461 7afddb 22 API calls 96460->96461 96462 791b96 RegisterWindowMessageW 96461->96462 96462->96413 96464 7d272d 96463->96464 96465 791abb 96463->96465 96479 803209 23 API calls 96464->96479 96466 7afddb 22 API calls 96465->96466 96468 791ac3 96466->96468 96468->96419 96469 7d2738 96470->96428 96471->96430 96480 80092a 28 API calls 96471->96480 96473 79a961 22 API calls 96472->96473 96474 7913fc 96473->96474 96475 79a961 22 API calls 96474->96475 96476 791404 96475->96476 96477 79a961 22 API calls 96476->96477 96478 7913c6 96477->96478 96478->96435 96479->96469 96481 7c8402 96486 7c81be 96481->96486 96484 7c842a 96491 7c81ef try_get_first_available_module 96486->96491 96488 7c83ee 96505 7c27ec 26 API calls ___std_exception_copy 96488->96505 96490 7c8343 96490->96484 96498 7d0984 96490->96498 96497 7c8338 96491->96497 96501 7b8e0b 40 API calls 2 library calls 96491->96501 96493 7c838c 96493->96497 96502 7b8e0b 40 API calls 2 library calls 96493->96502 96495 7c83ab 96495->96497 96503 7b8e0b 40 API calls 2 library calls 96495->96503 96497->96490 96504 7bf2d9 20 API calls _free 96497->96504 96506 7d0081 96498->96506 96500 7d099f 96500->96484 96501->96493 96502->96495 96503->96497 96504->96488 96505->96490 96508 7d008d CallCatchBlock 96506->96508 96507 7d009b 96564 7bf2d9 20 API calls _free 96507->96564 96508->96507 96510 7d00d4 96508->96510 96517 7d065b 96510->96517 96511 7d00a0 96565 7c27ec 26 API calls ___std_exception_copy 96511->96565 96515 7d00aa __fread_nolock 96515->96500 96567 7d042f 96517->96567 96520 7d068d 96599 7bf2c6 20 API calls _free 96520->96599 96521 7d06a6 96585 7c5221 96521->96585 96524 7d0692 96600 7bf2d9 20 API calls _free 96524->96600 96525 7d06ab 96526 7d06cb 96525->96526 96527 7d06b4 96525->96527 96598 7d039a CreateFileW 96526->96598 96601 7bf2c6 20 API calls _free 96527->96601 96531 7d00f8 96566 7d0121 LeaveCriticalSection __wsopen_s 96531->96566 96532 7d06b9 96602 7bf2d9 20 API calls _free 96532->96602 96533 7d0781 GetFileType 96536 7d078c GetLastError 96533->96536 96537 7d07d3 96533->96537 96535 7d0756 GetLastError 96604 7bf2a3 20 API calls 2 library calls 96535->96604 96605 7bf2a3 20 API calls 2 library calls 96536->96605 96607 7c516a 21 API calls 3 library calls 96537->96607 96538 7d0704 96538->96533 96538->96535 96603 7d039a CreateFileW 96538->96603 96542 7d079a CloseHandle 96542->96524 96543 7d07c3 96542->96543 96606 7bf2d9 20 API calls _free 96543->96606 96545 7d0749 96545->96533 96545->96535 96547 7d07f4 96549 7d0840 96547->96549 96608 7d05ab 72 API calls 4 library calls 96547->96608 96548 7d07c8 96548->96524 96553 7d086d 96549->96553 96609 7d014d 72 API calls 4 library calls 96549->96609 96552 7d0866 96552->96553 96555 7d087e 96552->96555 96554 7c86ae __wsopen_s 29 API calls 96553->96554 96554->96531 96555->96531 96556 7d08fc CloseHandle 96555->96556 96610 7d039a CreateFileW 96556->96610 96558 7d0927 96559 7d0931 GetLastError 96558->96559 96560 7d095d 96558->96560 96611 7bf2a3 20 API calls 2 library calls 96559->96611 96560->96531 96562 7d093d 96612 7c5333 21 API calls 3 library calls 96562->96612 96564->96511 96565->96515 96566->96515 96568 7d046a 96567->96568 96569 7d0450 96567->96569 96613 7d03bf 96568->96613 96569->96568 96620 7bf2d9 20 API calls _free 96569->96620 96572 7d045f 96621 7c27ec 26 API calls ___std_exception_copy 96572->96621 96574 7d04a2 96575 7d04d1 96574->96575 96622 7bf2d9 20 API calls _free 96574->96622 96583 7d0524 96575->96583 96624 7bd70d 26 API calls 2 library calls 96575->96624 96578 7d051f 96580 7d059e 96578->96580 96578->96583 96579 7d04c6 96623 7c27ec 26 API calls ___std_exception_copy 96579->96623 96625 7c27fc 11 API calls _abort 96580->96625 96583->96520 96583->96521 96584 7d05aa 96586 7c522d CallCatchBlock 96585->96586 96628 7c2f5e EnterCriticalSection 96586->96628 96588 7c5259 96590 7c5000 __wsopen_s 21 API calls 96588->96590 96591 7c525e 96590->96591 96596 7c527b 96591->96596 96632 7c5147 EnterCriticalSection 96591->96632 96592 7c52a4 __fread_nolock 96592->96525 96593 7c5234 96593->96588 96594 7c52c7 EnterCriticalSection 96593->96594 96593->96596 96595 7c52d4 LeaveCriticalSection 96594->96595 96594->96596 96595->96593 96629 7c532a 96596->96629 96598->96538 96599->96524 96600->96531 96601->96532 96602->96524 96603->96545 96604->96524 96605->96542 96606->96548 96607->96547 96608->96549 96609->96552 96610->96558 96611->96562 96612->96560 96616 7d03d7 96613->96616 96614 7d03f2 96614->96574 96616->96614 96626 7bf2d9 20 API calls _free 96616->96626 96617 7d0416 96627 7c27ec 26 API calls ___std_exception_copy 96617->96627 96619 7d0421 96619->96574 96620->96572 96621->96568 96622->96579 96623->96575 96624->96578 96625->96584 96626->96617 96627->96619 96628->96593 96633 7c2fa6 LeaveCriticalSection 96629->96633 96631 7c5331 96631->96592 96632->96596 96633->96631 96634 7e2a00 96650 79d7b0 messages 96634->96650 96635 79db11 PeekMessageW 96635->96650 96636 79d807 GetInputState 96636->96635 96636->96650 96637 7e1cbe TranslateAcceleratorW 96637->96650 96639 79db8f PeekMessageW 96639->96650 96640 79da04 timeGetTime 96640->96650 96641 79db73 TranslateMessage DispatchMessageW 96641->96639 96642 79dbaf Sleep 96642->96650 96643 7e2b74 Sleep 96656 7e2a51 96643->96656 96645 7e1dda timeGetTime 96680 7ae300 23 API calls 96645->96680 96647 7fd4dc 47 API calls 96647->96656 96649 7e2c0b GetExitCodeProcess 96651 7e2c37 CloseHandle 96649->96651 96652 7e2c21 WaitForSingleObject 96649->96652 96650->96635 96650->96636 96650->96637 96650->96639 96650->96640 96650->96641 96650->96642 96650->96643 96650->96645 96653 79d9d5 96650->96653 96650->96656 96662 79ec40 348 API calls 96650->96662 96663 7a1310 348 API calls 96650->96663 96664 79bf40 348 API calls 96650->96664 96666 79dd50 96650->96666 96673 7aedf6 96650->96673 96678 79dfd0 348 API calls 3 library calls 96650->96678 96679 7ae551 timeGetTime 96650->96679 96681 803a2a 23 API calls 96650->96681 96682 80359c 82 API calls __wsopen_s 96650->96682 96651->96656 96652->96650 96652->96651 96654 8229bf GetForegroundWindow 96654->96656 96656->96647 96656->96649 96656->96650 96656->96653 96656->96654 96657 7e2ca9 Sleep 96656->96657 96683 815658 23 API calls 96656->96683 96684 7fe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96656->96684 96685 7ae551 timeGetTime 96656->96685 96657->96650 96662->96650 96663->96650 96664->96650 96667 79dd6f 96666->96667 96669 79dd83 96666->96669 96686 79d260 96667->96686 96718 80359c 82 API calls __wsopen_s 96669->96718 96671 79dd7a 96671->96650 96672 7e2f75 96672->96672 96674 7aee09 96673->96674 96675 7aee12 96673->96675 96674->96650 96675->96674 96676 7aee36 IsDialogMessageW 96675->96676 96677 7eefaf GetClassLongW 96675->96677 96676->96674 96676->96675 96677->96675 96677->96676 96678->96650 96679->96650 96680->96650 96681->96650 96682->96650 96683->96656 96684->96656 96685->96656 96687 79ec40 348 API calls 96686->96687 96706 79d29d 96687->96706 96688 7e1bc4 96724 80359c 82 API calls __wsopen_s 96688->96724 96690 79d30b messages 96690->96671 96691 79d6d5 96691->96690 96702 7afe0b 22 API calls 96691->96702 96692 79d3c3 96692->96691 96694 79d3ce 96692->96694 96693 79d5ff 96695 7e1bb5 96693->96695 96696 79d614 96693->96696 96698 7afddb 22 API calls 96694->96698 96723 815705 23 API calls 96695->96723 96700 7afddb 22 API calls 96696->96700 96697 79d4b8 96703 7afe0b 22 API calls 96697->96703 96707 79d3d5 __fread_nolock 96698->96707 96712 79d46a 96700->96712 96701 7afddb 22 API calls 96701->96706 96702->96707 96710 79d429 __fread_nolock messages 96703->96710 96704 7afddb 22 API calls 96705 79d3f6 96704->96705 96705->96710 96719 79bec0 348 API calls 96705->96719 96706->96688 96706->96690 96706->96691 96706->96692 96706->96697 96706->96701 96706->96710 96707->96704 96707->96705 96709 7e1ba4 96722 80359c 82 API calls __wsopen_s 96709->96722 96710->96693 96710->96709 96710->96712 96713 791f6f 348 API calls 96710->96713 96714 7e1b7f 96710->96714 96716 7e1b5d 96710->96716 96712->96671 96713->96710 96721 80359c 82 API calls __wsopen_s 96714->96721 96720 80359c 82 API calls __wsopen_s 96716->96720 96718->96672 96719->96710 96720->96712 96721->96712 96722->96712 96723->96688 96724->96690 96725 7d2402 96728 791410 96725->96728 96729 7d24b8 DestroyWindow 96728->96729 96730 79144f mciSendStringW 96728->96730 96743 7d24c4 96729->96743 96731 79146b 96730->96731 96732 7916c6 96730->96732 96733 791479 96731->96733 96731->96743 96732->96731 96734 7916d5 UnregisterHotKey 96732->96734 96761 79182e 96733->96761 96734->96732 96737 7d2509 96742 7d252d 96737->96742 96744 7d251c FreeLibrary 96737->96744 96738 7d24d8 96738->96743 96767 796246 CloseHandle 96738->96767 96739 7d24e2 FindClose 96739->96743 96741 79148e 96741->96742 96748 79149c 96741->96748 96745 7d2541 VirtualFree 96742->96745 96750 791509 96742->96750 96743->96737 96743->96738 96743->96739 96744->96737 96745->96742 96746 7914f8 CoUninitialize 96746->96750 96747 7d2589 96755 7d2598 messages 96747->96755 96768 8032eb 6 API calls messages 96747->96768 96748->96746 96750->96747 96751 791514 96750->96751 96765 791944 VirtualFreeEx CloseHandle 96751->96765 96753 79153a 96753->96755 96756 79161f 96753->96756 96757 7d2627 96755->96757 96769 7f64d4 22 API calls messages 96755->96769 96756->96757 96758 79166d 96756->96758 96757->96757 96758->96757 96766 791876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96758->96766 96760 7916c1 96762 79183b 96761->96762 96763 791480 96762->96763 96770 7f702a 22 API calls 96762->96770 96763->96737 96763->96741 96765->96753 96766->96760 96767->96738 96768->96747 96769->96755 96770->96762

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 400 7942de-79434d call 79a961 GetVersionExW call 796b57 405 7d3617-7d362a 400->405 406 794353 400->406 407 7d362b-7d362f 405->407 408 794355-794357 406->408 409 7d3631 407->409 410 7d3632-7d363e 407->410 411 79435d-7943bc call 7993b2 call 7937a0 408->411 412 7d3656 408->412 409->410 410->407 413 7d3640-7d3642 410->413 426 7d37df-7d37e6 411->426 427 7943c2-7943c4 411->427 416 7d365d-7d3660 412->416 413->408 415 7d3648-7d364f 413->415 415->405 418 7d3651 415->418 419 79441b-794435 GetCurrentProcess IsWow64Process 416->419 420 7d3666-7d36a8 416->420 418->412 423 794494-79449a 419->423 424 794437 419->424 420->419 425 7d36ae-7d36b1 420->425 428 79443d-794449 423->428 424->428 429 7d36db-7d36e5 425->429 430 7d36b3-7d36bd 425->430 434 7d37e8 426->434 435 7d3806-7d3809 426->435 427->416 433 7943ca-7943dd 427->433 438 79444f-79445e LoadLibraryA 428->438 439 7d3824-7d3828 GetSystemInfo 428->439 436 7d36f8-7d3702 429->436 437 7d36e7-7d36f3 429->437 431 7d36bf-7d36c5 430->431 432 7d36ca-7d36d6 430->432 431->419 432->419 440 7943e3-7943e5 433->440 441 7d3726-7d372f 433->441 442 7d37ee 434->442 445 7d380b-7d381a 435->445 446 7d37f4-7d37fc 435->446 443 7d3715-7d3721 436->443 444 7d3704-7d3710 436->444 437->419 447 79449c-7944a6 GetSystemInfo 438->447 448 794460-79446e GetProcAddress 438->448 450 7d374d-7d3762 440->450 451 7943eb-7943ee 440->451 452 7d373c-7d3748 441->452 453 7d3731-7d3737 441->453 442->446 443->419 444->419 445->442 454 7d381c-7d3822 445->454 446->435 449 794476-794478 447->449 448->447 455 794470-794474 GetNativeSystemInfo 448->455 460 79447a-79447b FreeLibrary 449->460 461 794481-794493 449->461 458 7d376f-7d377b 450->458 459 7d3764-7d376a 450->459 456 7d3791-7d3794 451->456 457 7943f4-79440f 451->457 452->419 453->419 454->446 455->449 456->419 464 7d379a-7d37c1 456->464 462 794415 457->462 463 7d3780-7d378c 457->463 458->419 459->419 460->461 462->419 463->419 465 7d37ce-7d37da 464->465 466 7d37c3-7d37c9 464->466 465->419 466->419
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetVersionExW.KERNEL32(?), ref: 0079430D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,0082CB64,00000000,?,?), ref: 00794422
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 00794429
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00794454
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00794466
                                                                                                                                                                                                                                                                                                                                                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00794474
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 0079447B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 007944A0
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 935d42eda8074b7b9355b454a01aaabd4ec989fa7af42986b73f2fb7e7bcab03
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8A1957590A2C0DFCF11CB797E896AA7FB57B36300B1E6499D04393B23D6AC4509CB62

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 804 7942a2-7942ba CreateStreamOnHGlobal 805 7942da-7942dd 804->805 806 7942bc-7942d3 FindResourceExW 804->806 807 7942d9 806->807 808 7d35ba-7d35c9 LoadResource 806->808 807->805 808->807 809 7d35cf-7d35dd SizeofResource 808->809 809->807 810 7d35e3-7d35ee LockResource 809->810 810->807 811 7d35f4-7d3612 810->811 811->807
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007950AA,?,?,00000000,00000000), ref: 007942B2
                                                                                                                                                                                                                                                                                                                                                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007950AA,?,?,00000000,00000000), ref: 007942C9
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35BE
                                                                                                                                                                                                                                                                                                                                                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35D3
                                                                                                                                                                                                                                                                                                                                                                                                    • LockResource.KERNEL32(007950AA,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20,?), ref: 007D35E6
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SCRIPT
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 10dc61bd9401ea3704bbcba36bd53c346990acf38339ccb6d1e52d825f8aea60
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C6113C71200701BFEB218B65EC49F6B7BB9FFC5B51F248169B412D6250DB71D8019660

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,00852224), ref: 007D2C10
                                                                                                                                                                                                                                                                                                                                                                                                    • ShellExecuteW.SHELL32(00000000,?,?,00852224), ref: 007D2C17
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: runas
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 166809002b5f5bd619aa244b9b0e33685f561968ff92ed27c58b7515637e77ac
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9577fe96b75e3bb4f651245f3c57196b9cf4e365eafc822a574ccb1d5414e23c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 166809002b5f5bd619aa244b9b0e33685f561968ff92ed27c58b7515637e77ac
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC11D271208301EACF14FF64F85AD7EBBA5ABA1341F48542DF556431A3DF2D890A8712

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                                                                                                                                                                                                                                                                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                                                                                                                                                                                                                                                                                                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 007FD52F
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 007FD5DC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 420147892-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b5c7125f56644b8de74e19901f072bbf0970f0e3dd880d0e1f39df9921627f91
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0d489c860c6a58efff2ea05f20a90145d5df0d4f63e5a10a395194879a70808c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b5c7125f56644b8de74e19901f072bbf0970f0e3dd880d0e1f39df9921627f91
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B831A1710083049FD711EF64D885ABFBBE8FF99354F10092DF681832A1EB759949CBA2

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 1004 7fdbbe-7fdbda lstrlenW 1005 7fdbdc-7fdbe6 GetFileAttributesW 1004->1005 1006 7fdc06 1004->1006 1007 7fdc09-7fdc0d 1005->1007 1008 7fdbe8-7fdbf7 FindFirstFileW 1005->1008 1006->1007 1008->1006 1009 7fdbf9-7fdc04 FindClose 1008->1009 1009->1007
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,007D5222), ref: 007FDBCE
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 007FDBDD
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007FDBEE
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 007FDBFA
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2695905019-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 792e1cac755db5d6ba580578b15ecdaa7cace16a7210d0a25c971493f3e8700e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9CF0A0308109189B82306B78AC0E8BE37ADAE01334F108702F976C22E0EBB45D56C6E5
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D09
                                                                                                                                                                                                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D10
                                                                                                                                                                                                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 007B4D22
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1703294689-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2dceb215dccfcaab69cfa35605a1c5dcf440cc4098ecdd23db729d6cd84d813e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F7E0B631100548ABCF21AF64DD0EBA83B69FB41795B108418FD059A223CB39DD52DB84

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 0 81aff9-81b056 call 7b2340 3 81b094-81b098 0->3 4 81b058-81b06b call 79b567 0->4 6 81b09a-81b0bb call 79b567 * 2 3->6 7 81b0dd-81b0e0 3->7 12 81b0c8 4->12 13 81b06d-81b092 call 79b567 * 2 4->13 28 81b0bf-81b0c4 6->28 9 81b0e2-81b0e5 7->9 10 81b0f5-81b119 call 797510 call 797620 7->10 14 81b0e8-81b0ed call 79b567 9->14 31 81b1d8-81b1e0 10->31 32 81b11f-81b178 call 797510 call 797620 call 797510 call 797620 call 797510 call 797620 10->32 17 81b0cb-81b0cf 12->17 13->28 14->10 22 81b0d1-81b0d7 17->22 23 81b0d9-81b0db 17->23 22->14 23->7 23->10 28->7 33 81b0c6 28->33 36 81b1e2-81b1fd call 797510 call 797620 31->36 37 81b20a-81b238 GetCurrentDirectoryW call 7afe0b GetCurrentDirectoryW 31->37 82 81b1a6-81b1d6 GetSystemDirectoryW call 7afe0b GetSystemDirectoryW 32->82 83 81b17a-81b195 call 797510 call 797620 32->83 33->17 36->37 53 81b1ff-81b208 call 7b4963 36->53 45 81b23c 37->45 48 81b240-81b244 45->48 51 81b275-81b285 call 8000d9 48->51 52 81b246-81b270 call 799c6e * 3 48->52 64 81b287-81b289 51->64 65 81b28b-81b2e1 call 8007c0 call 8006e6 call 8005a7 51->65 52->51 53->37 53->51 66 81b2ee-81b2f2 64->66 65->66 98 81b2e3 65->98 71 81b2f8-81b321 call 7f11c8 66->71 72 81b39a-81b3be CreateProcessW 66->72 87 81b323-81b328 call 7f1201 71->87 88 81b32a call 7f14ce 71->88 76 81b3c1-81b3d4 call 7afe14 * 2 72->76 103 81b3d6-81b3e8 76->103 104 81b42f-81b43d CloseHandle 76->104 82->45 83->82 105 81b197-81b1a0 call 7b4963 83->105 97 81b32f-81b33c call 7b4963 87->97 88->97 113 81b347-81b357 call 7b4963 97->113 114 81b33e-81b345 97->114 98->66 109 81b3ea 103->109 110 81b3ed-81b3fc 103->110 107 81b49c 104->107 108 81b43f-81b444 104->108 105->48 105->82 111 81b4a0-81b4a4 107->111 115 81b451-81b456 108->115 116 81b446-81b44c CloseHandle 108->116 109->110 117 81b401-81b42a GetLastError call 79630c call 79cfa0 110->117 118 81b3fe 110->118 119 81b4b2-81b4bc 111->119 120 81b4a6-81b4b0 111->120 136 81b362-81b372 call 7b4963 113->136 137 81b359-81b360 113->137 114->113 114->114 123 81b463-81b468 115->123 124 81b458-81b45e CloseHandle 115->124 116->115 127 81b4e5-81b4f6 call 800175 117->127 118->117 128 81b4c4-81b4e3 call 79cfa0 CloseHandle 119->128 129 81b4be 119->129 120->127 131 81b475-81b49a call 8009d9 call 81b536 123->131 132 81b46a-81b470 CloseHandle 123->132 124->123 128->127 129->128 131->111 132->131 146 81b374-81b37b 136->146 147 81b37d-81b398 call 7afe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081B198
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1B0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1D4
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081B200
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B214
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B236
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081B332
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008005A7: GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081B34B
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081B366
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081B3B6
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000), ref: 0081B407
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0081B439
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0081B44A
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0081B45C
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0081B46E
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0081B4E3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2178637699-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3e5b5c1a75dffdd3cc3b24adaa537c735ff73c198a30aab4d699f12deefe618c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 203d3f5f10fc92cf8c479dd990ce0a53f1582e222c9d83a057180ef5787548ea
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e5b5c1a75dffdd3cc3b24adaa537c735ff73c198a30aab4d699f12deefe618c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 40F17931508240DFCB24EF24D885BAABBE5FF85314F14855DF8999B2A2DB35EC84CB52
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetInputState.USER32 ref: 0079D807
                                                                                                                                                                                                                                                                                                                                                                                                    • timeGetTime.WINMM ref: 0079DA07
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNELBASE(0000000A), ref: 0079DBB1
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A), ref: 007E2B76
                                                                                                                                                                                                                                                                                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 007E2C11
                                                                                                                                                                                                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(?,00000000), ref: 007E2C29
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 007E2C3D
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 007E2CA9
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 388478766-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8335cb30ad768a10477a88f3b11371cf5bfa15370f2da31ade853f5d669dac5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5ba9065383869afa9532a8f43e3f433886421c8e58b578957856e4d8a77b243c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8335cb30ad768a10477a88f3b11371cf5bfa15370f2da31ade853f5d669dac5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F1423370608281DFDB34DF25D848B7AB7E5FF8A310F148619E456872A2D778EC45CB92

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                                                                                                                                                                                                                                                                                                                                                                    • RegisterClassExW.USER32(00000030), ref: 00792D31
                                                                                                                                                                                                                                                                                                                                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                                                                                                                                                                                                                                                                                                                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadIconW.USER32(000000A9), ref: 00792D85
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 80e129b6d6d74aa8acd9c5711094b239631249b26e6baf77557b16a61d606595
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2121E0B1901218AFDF10DFA8E889BEDBFB4FB08701F04811AF611A62A0D7B54544CF91

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 468 7d065b-7d068b call 7d042f 471 7d068d-7d0698 call 7bf2c6 468->471 472 7d06a6-7d06b2 call 7c5221 468->472 477 7d069a-7d06a1 call 7bf2d9 471->477 478 7d06cb-7d0714 call 7d039a 472->478 479 7d06b4-7d06c9 call 7bf2c6 call 7bf2d9 472->479 488 7d097d-7d0983 477->488 486 7d0716-7d071f 478->486 487 7d0781-7d078a GetFileType 478->487 479->477 491 7d0756-7d077c GetLastError call 7bf2a3 486->491 492 7d0721-7d0725 486->492 493 7d078c-7d07bd GetLastError call 7bf2a3 CloseHandle 487->493 494 7d07d3-7d07d6 487->494 491->477 492->491 497 7d0727-7d0754 call 7d039a 492->497 493->477 505 7d07c3-7d07ce call 7bf2d9 493->505 495 7d07df-7d07e5 494->495 496 7d07d8-7d07dd 494->496 500 7d07e9-7d0837 call 7c516a 495->500 501 7d07e7 495->501 496->500 497->487 497->491 511 7d0839-7d0845 call 7d05ab 500->511 512 7d0847-7d086b call 7d014d 500->512 501->500 505->477 511->512 519 7d086f-7d0879 call 7c86ae 511->519 517 7d086d 512->517 518 7d087e-7d08c1 512->518 517->519 521 7d08c3-7d08c7 518->521 522 7d08e2-7d08f0 518->522 519->488 521->522 524 7d08c9-7d08dd 521->524 525 7d097b 522->525 526 7d08f6-7d08fa 522->526 524->522 525->488 526->525 527 7d08fc-7d092f CloseHandle call 7d039a 526->527 530 7d0931-7d095d GetLastError call 7bf2a3 call 7c5333 527->530 531 7d0963-7d0977 527->531 530->531 531->525
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007D039A: CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007D076F
                                                                                                                                                                                                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 007D0776
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileType.KERNELBASE(00000000), ref: 007D0782
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007D078C
                                                                                                                                                                                                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 007D0795
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 007D07B5
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 007D08FF
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007D0931
                                                                                                                                                                                                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 007D0938
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: H
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e41a6e7cdb754b49df84f6c576ad8e7cce330381d4aac5ee217ae32bc909bc39
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 51A10232A001089FDF19EF68DC55BAE7BB0AB46320F14515EF8159F3D1DB799812CB91

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00793379
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0079356A
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007D318D
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007D31CE
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 007D3210
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007D3277
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007D3286
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c1331f5809b1cafbbf1ece8e126b01113da6b2e9acb8892e5e57b41152a2fc64
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d5fa5aa0d6b791d432f35919a0b0239c36dec11d36a9d2d3caac563c402812ee
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c1331f5809b1cafbbf1ece8e126b01113da6b2e9acb8892e5e57b41152a2fc64
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6971AB714047019EC714EF69ED859ABBBE8FF85340F41182EF185833B0EB789A48CB62

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00792B8E
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00792B9D
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadIconW.USER32(00000063), ref: 00792BB3
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadIconW.USER32(000000A4), ref: 00792BC5
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadIconW.USER32(000000A2), ref: 00792BD7
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00792BEF
                                                                                                                                                                                                                                                                                                                                                                                                    • RegisterClassExW.USER32(?), ref: 00792C40
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: RegisterClassExW.USER32(00000030), ref: 00792D31
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: LoadIconW.USER32(000000A9), ref: 00792D85
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d398288a8b67f5b24e8047e9290b19c75eedd2a1bc62831b76022c300fefb2a6
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F4213970E10318AFDF119FA9EE49AAD7FB4FB08B50F09502AE501A67A1D7F90540DF90

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 609 793170-793185 610 7931e5-7931e7 609->610 611 793187-79318a 609->611 610->611 614 7931e9 610->614 612 7931eb 611->612 613 79318c-793193 611->613 616 7d2dfb-7d2e23 call 7918e2 call 7ae499 612->616 617 7931f1-7931f6 612->617 618 793199-79319e 613->618 619 793265-79326d PostQuitMessage 613->619 615 7931d0-7931d8 DefWindowProcW 614->615 625 7931de-7931e4 615->625 655 7d2e28-7d2e2f 616->655 620 7931f8-7931fb 617->620 621 79321d-793244 SetTimer RegisterWindowMessageW 617->621 623 7d2e7c-7d2e90 call 7fbf30 618->623 624 7931a4-7931a8 618->624 626 793219-79321b 619->626 627 7d2d9c-7d2d9f 620->627 628 793201-79320f KillTimer call 7930f2 620->628 621->626 630 793246-793251 CreatePopupMenu 621->630 623->626 650 7d2e96 623->650 631 7d2e68-7d2e72 call 7fc161 624->631 632 7931ae-7931b3 624->632 626->625 640 7d2dd7-7d2df6 MoveWindow 627->640 641 7d2da1-7d2da5 627->641 645 793214 call 793c50 628->645 630->626 646 7d2e77 631->646 637 7d2e4d-7d2e54 632->637 638 7931b9-7931be 632->638 637->615 644 7d2e5a-7d2e63 call 7f0ad7 637->644 648 793253-793263 call 79326f 638->648 649 7931c4-7931ca 638->649 640->626 642 7d2da7-7d2daa 641->642 643 7d2dc6-7d2dd2 SetFocus 641->643 642->649 651 7d2db0-7d2dc1 call 7918e2 642->651 643->626 644->615 645->626 646->626 648->626 649->615 649->655 650->615 651->626 655->615 659 7d2e35-7d2e48 call 7930f2 call 793837 655->659 659->615
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0079316A,?,?), ref: 007931D8
                                                                                                                                                                                                                                                                                                                                                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,0079316A,?,?), ref: 00793204
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00793227
                                                                                                                                                                                                                                                                                                                                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0079316A,?,?), ref: 00793232
                                                                                                                                                                                                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 00793246
                                                                                                                                                                                                                                                                                                                                                                                                    • PostQuitMessage.USER32(00000000), ref: 00793267
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: TaskbarCreated
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: df5087c3081f686b307d9fc9972cef6407dd4c635807f8703e709e64a73f05d2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b88ead795fda486ace0de007072902b9d5d3a1b483f53d4068bbec3cff35ffe2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: df5087c3081f686b307d9fc9972cef6407dd4c635807f8703e709e64a73f05d2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CC41EA31244608ABDF245BB8BD4DB7D3A5AF705340F094126F512C63B3C7AD9A42D7A1

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 665 791410-791449 666 7d24b8-7d24b9 DestroyWindow 665->666 667 79144f-791465 mciSendStringW 665->667 671 7d24c4-7d24d1 666->671 668 79146b-791473 667->668 669 7916c6-7916d3 667->669 670 791479-791488 call 79182e 668->670 668->671 672 7916f8-7916ff 669->672 673 7916d5-7916f0 UnregisterHotKey 669->673 685 7d250e-7d251a 670->685 686 79148e-791496 670->686 677 7d2500-7d2507 671->677 678 7d24d3-7d24d6 671->678 672->668 676 791705 672->676 673->672 675 7916f2-7916f3 call 7910d0 673->675 675->672 676->669 677->671 681 7d2509 677->681 682 7d24d8-7d24e0 call 796246 678->682 683 7d24e2-7d24e5 FindClose 678->683 681->685 687 7d24eb-7d24f8 682->687 683->687 692 7d251c-7d251e FreeLibrary 685->692 693 7d2524-7d252b 685->693 689 79149c-7914c1 call 79cfa0 686->689 690 7d2532-7d253f 686->690 687->677 691 7d24fa-7d24fb call 8032b1 687->691 703 7914f8-791503 CoUninitialize 689->703 704 7914c3 689->704 697 7d2566-7d256d 690->697 698 7d2541-7d255e VirtualFree 690->698 691->677 692->693 693->685 696 7d252d 693->696 696->690 697->690 700 7d256f 697->700 698->697 699 7d2560-7d2561 call 803317 698->699 699->697 705 7d2574-7d2578 700->705 703->705 707 791509-79150e 703->707 706 7914c6-7914f6 call 791a05 call 7919ae 704->706 705->707 708 7d257e-7d2584 705->708 706->703 710 7d2589-7d2596 call 8032eb 707->710 711 791514-79151e 707->711 708->707 724 7d2598 710->724 712 791524-79152f call 79988f 711->712 713 791707-791714 call 7af80e 711->713 725 791535 call 791944 712->725 713->712 726 79171a 713->726 728 7d259d-7d25bf call 7afdcd 724->728 727 79153a-7915a5 call 7917d5 call 7afe14 call 79177c call 79988f call 79cfa0 call 7917fe call 7afe14 725->727 726->713 727->728 754 7915ab-7915cf call 7afe14 727->754 733 7d25c1 728->733 736 7d25c6-7d25e8 call 7afdcd 733->736 742 7d25ea 736->742 745 7d25ef-7d2611 call 7afdcd 742->745 752 7d2613 745->752 755 7d2618-7d2625 call 7f64d4 752->755 754->736 761 7915d5-7915f9 call 7afe14 754->761 760 7d2627 755->760 763 7d262c-7d2639 call 7aac64 760->763 761->745 766 7915ff-791619 call 7afe14 761->766 769 7d263b 763->769 766->755 771 79161f-791643 call 7917d5 call 7afe14 766->771 772 7d2640-7d264d call 803245 769->772 771->763 780 791649-791651 771->780 779 7d264f 772->779 782 7d2654-7d2661 call 8032cc 779->782 780->772 781 791657-791668 call 79988f call 79190a 780->781 789 79166d-791675 781->789 788 7d2663 782->788 790 7d2668-7d2675 call 8032cc 788->790 789->782 791 79167b-791689 789->791 796 7d2677 790->796 791->790 793 79168f-7916c5 call 79988f * 3 call 791876 791->793 796->796
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00791459
                                                                                                                                                                                                                                                                                                                                                                                                    • CoUninitialize.COMBASE ref: 007914F8
                                                                                                                                                                                                                                                                                                                                                                                                    • UnregisterHotKey.USER32(?), ref: 007916DD
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 007D24B9
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 007D251E
                                                                                                                                                                                                                                                                                                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007D254B
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: close all
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8afa14bbc6f75916f33674c10cd1d783ebe0fc5321123e2fd819a1ac64a177db
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c7861e0bdc8097eba4ee072285c9850986ecb3fcb0f69fcd631089ab8104a70d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8afa14bbc6f75916f33674c10cd1d783ebe0fc5321123e2fd819a1ac64a177db
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28D17C31701212CFDB29DF54E899A29F7A0BF15700F5542AEE54AAB352DB38AC23CF51

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 814 792c63-792cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00792C91
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00792CB2
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CC6
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CCF
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$CreateShow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 85e585367615bd840bfe22b5ca990b4eff3bd5d3110f68de9ec868e68df2204f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ECF03A755402907AEB310717AC0CE7B2EBDF7CAF50B06501AF901A63A1C2A90881EAB0

                                                                                                                                                                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                                                                                                                                                                    control_flow_graph 965 793b1c-793b27 966 793b99-793b9b 965->966 967 793b29-793b2e 965->967 968 793b8c-793b8f 966->968 967->966 969 793b30-793b48 RegOpenKeyExW 967->969 969->966 970 793b4a-793b69 RegQueryValueExW 969->970 971 793b6b-793b76 970->971 972 793b80-793b8b RegCloseKey 970->972 973 793b78-793b7a 971->973 974 793b90-793b97 971->974 972->968 975 793b7e 973->975 974->975 975->972
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B40
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B61
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B83
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d5c9a689b2db10edfac13b2b75b3d4d61fdd74f3280ff45a762a947ee92bd976
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8E1127B5610208FFDF208FA5EC84EAEBBB8EF04744B10846AA805D7210E2759E419BA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007D33A2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Line:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 144237a5fdc609f7cccada962d3bf688dfd29444f4b4c51b1bc335682e86a814
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2fdb00029ab7ed4d7db430bf05aacc577d295dbbb240c7a3af1a915a491b316a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 144237a5fdc609f7cccada962d3bf688dfd29444f4b4c51b1bc335682e86a814
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7F31B871408300AADB25EB10EC49FEFB7E8BB44714F14451EF59993292DB7CA649C7C2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B32A4: RaiseException.KERNEL32(?,?,?,007B068A,?,00861444,?,?,?,?,?,?,007B068A,00791129,00858738,00791129), ref: 007B3304
                                                                                                                                                                                                                                                                                                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Unknown exception
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a37aa8c7e60c0ad228c994d5be88854ac8b24b2a5b9ec1549f6a863cb4280baa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 3626fd04f278ba540db8005f23b9ba1035353744a8bb6961e8f182ee64b1ecff
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a37aa8c7e60c0ad228c994d5be88854ac8b24b2a5b9ec1549f6a863cb4280baa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61F0C23490020DF78F14B6A4D85AEDF776CAE40354B608131F924D6592EF79DA69C6C0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00791B4A: RegisterWindowMessageW.USER32(00000004,?,007912C4), ref: 00791BA2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0079136A
                                                                                                                                                                                                                                                                                                                                                                                                    • OleInitialize.OLE32 ref: 00791388
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 007D24AB
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1986988660-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 738ae330082690405791bbdc6ff39a4a900652620ebc1d55467ed0fde97f0abe
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9B71BFB49112018ECF84DFBAB94D659BAE1FB8834475EA23AD10BC7363EBB44445CF85
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                                                                                                                                                                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007FC259
                                                                                                                                                                                                                                                                                                                                                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 007FC261
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007FC270
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3500052701-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fc89c4ad70b6a98d259dfb4ce3f2a30ed1be3f8ac97029db5285c854c85fae5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d035f678e4b71a02f4b62a5f63034036940ec6b55a205a9173914a0ce1d2a3eb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fc89c4ad70b6a98d259dfb4ce3f2a30ed1be3f8ac97029db5285c854c85fae5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AA31647090434CAFEB339B648955BFBBBECAF06304F04449AD79A97341C7785A85CB51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000,00000000,?,?,007C85CC,?,00858CC8,0000000C), ref: 007C8704
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,007C85CC,?,00858CC8,0000000C), ref: 007C870E
                                                                                                                                                                                                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 007C8739
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2583163307-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 038aedd8378d93648f40ed4e035e14a38a920da34e65a84ba1646d2e9795eb76
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75018E3260526066C3B06334684DF7F67494B8177CF39021DF804AB1D3DEADECC18192
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 0079DB7B
                                                                                                                                                                                                                                                                                                                                                                                                    • DispatchMessageW.USER32(?), ref: 0079DB89
                                                                                                                                                                                                                                                                                                                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0079DB9F
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNELBASE(0000000A), ref: 0079DBB1
                                                                                                                                                                                                                                                                                                                                                                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 007E1CC9
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3288985973-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 94ee07bf90e4766d926a0e5dd3892789b8e91932b996e4683b307bbc4704acda
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 463e02b8307d0bc9fba0aed3d030c9946e1304ed8edb04472ce21d1071fe0772
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 94ee07bf90e4766d926a0e5dd3892789b8e91932b996e4683b307bbc4704acda
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61F054306043409BEB30C7A19C49FAA73A8FB45310F504A29E61AC30D0DB3894499B25
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • __Init_thread_footer.LIBCMT ref: 007A17F6
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Init_thread_footer
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: CALL
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 421d34b26b4ea148b5dd6ac9003a50353d534ccd38f88309c26a634a437a76d7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 386abfe4fa2cc6255c56fa3ff80ec4ef6cd7231a6847f22c8e390bce480d29e5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 421d34b26b4ea148b5dd6ac9003a50353d534ccd38f88309c26a634a437a76d7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E2229B70608241DFE714CF14C894A2ABBF1BFDA354F548A6DF4968B3A1D739E851CB82
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 007D2C8C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00792DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: X
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6695ef9d248abe62d98f549ebebb0cddeb006256bb336571e705132d4875a4cb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FA219971A102589FDF41EF94D849BDE7BF8AF48305F404059E505E7341EBB8594E8F61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c8d43d58b3346000870bc61e56436d4c6fa0346ddd3438c1d8fad8fe72094e3b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2f3ebd533947ee924f3b2a3686ff50593c3ea215e7337e3bdf96b13b0f1c93eb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c8d43d58b3346000870bc61e56436d4c6fa0346ddd3438c1d8fad8fe72094e3b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71318070504301DFDB20DF24E989B97BBE4FB49718F04092EF59A87341E7B9AA44CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • timeGetTime.WINMM ref: 007AF661
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079D730: GetInputState.USER32 ref: 0079D807
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000), ref: 007EF2DE
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4149333218-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8ea403bf5d826e3d4984445c7abc6038e519143809f64441836822ce692db8cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: cd2390483bfc6c69f66d201f278ec05f6148bfbbbadd40b6120ebfad1b596b1a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ea403bf5d826e3d4984445c7abc6038e519143809f64441836822ce692db8cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 04F08C31240A05EFD320EFA9E549B6AB7E8FF49760F00402AE859C7260DB70A810CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00794E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00794E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00794E90: FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EFD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00794E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00794E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00794E59: FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2632591731-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6b0ad246482d5bcc4af6abb3e9e1b2656c99c02d8eff87cb9adcf234ab7ebb1d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 4608e6460e2bfca4f21fd3460a3852ce9c5619733259aed49a218a51784e7ec1
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6b0ad246482d5bcc4af6abb3e9e1b2656c99c02d8eff87cb9adcf234ab7ebb1d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72110632610216EACF24FF74EC0AFAD77A6AF40750F10842EF542B62D1EE789E469750
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: __wsopen_s
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3347428461-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7bb2b5691baea7f0c2c3c6a4ae491c475b1ed32b7a06d529656d13672050ff95
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC11187590410AAFCB09DF58E945E9A7BF5EF48314F154069FC08AB312DA31EA11CBA5
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C4C7D: RtlAllocateHeap.NTDLL(00000008,00791129,00000000,?,007C2E29,00000001,00000364,?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?), ref: 007C4CBE
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C506C
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AllocateHeap_free
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 614378929-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d9d0e5e3afa42ce4db3d10139cc1e9fc1b7ebc66b8715dfc31a7a3a1df2d5087
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8012672204704ABE3318E659885F5AFBE8FB89370F25061DE58493280EB35B985C6B4
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7bb0f0430eb54cbbb47a9fce119b1fbec87699e6dee5000cb9f6e4fa74dbe20c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C1F0C832511A14EAD7313A699C0DFDA37989F52339F10072DF925D33D2DB7CE80286A6
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(00000008,00791129,00000000,?,007C2E29,00000001,00000364,?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?), ref: 007C4CBE
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 603bfa1663ef76a8e636a0d006441a314a66a56ea11af834b7f5ba55995f1765
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1e56f27f81995b2835c4ea6ee6b002c5f655a843a2325393c4a17ecaecaf2c39
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 603bfa1663ef76a8e636a0d006441a314a66a56ea11af834b7f5ba55995f1765
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BFF0E932602224A7DB315F629C19F9A3788BF417B1B19411DFC15E72A1CB7CD80146F0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 07332740cedc7133cc962f4ceeded3eb6984d74b6c6f6981516ee786fe0059a7
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03E0E532104624AAF6312A669C09FEA37D8AB42BB0F09802EFC0592581CB1CDD0185F0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794F6D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4cf7c5689717d4d054889eadd488f04ae3ac5b7b44b46e583645f250e3ce79b2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0e67bf06989733bd46296256f6149fd0240226587a8bc39da44dcc509a31d4be
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4cf7c5689717d4d054889eadd488f04ae3ac5b7b44b46e583645f250e3ce79b2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F0F03971105752CFDF349F64E494C66BBE6FF143293288A7EE1EA82621C7399845DF10
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindow.USER32(00000000), ref: 00822A66
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2353593579-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 06cdd353116719869711d6074f2e39f816ab725b585c1ca0868e792627d5230b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1b491fedc7daedeeaff3d35177b6284add27374ec9cbab8ac7a64cb1c42ad27e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06cdd353116719869711d6074f2e39f816ab725b585c1ca0868e792627d5230b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E1E04F3635013EBAC754EA30EC848FE735CFB54399710463AAD1BD2650DB34999586A0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5cac19a2d90a0d7d5cc49f7d1b29aae9b93343ef7e94b52d41423b01951069ed
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 654498989bdc73b2077ec103a7ef98db9f1c363d2a2dec2b83f7ab59727ed30d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5cac19a2d90a0d7d5cc49f7d1b29aae9b93343ef7e94b52d41423b01951069ed
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9FF0A7709043089FEB529B24DC49BDA7BFCB701708F0400E5E14997392D7B85788CF81
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 541455249-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a2e3175cc91fe7520817b2dfa6f963f0b0fba8e271ecbdcf22382962eb9483d2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 85E0CD726001249BCB209398DC09FEA77EDDFC8790F044171FD09D724CDA64AD848550
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079D730: GetInputState.USER32 ref: 0079D807
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3667716007-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4d7e7fab0a873c5b38a5752417760c00142bf77593179257a43a6b83af0d061b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c9c7c91cda7b62c87ad5b59d47a01f173c7cb81440686caa6b04665ce1df4674
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d7e7fab0a873c5b38a5752417760c00142bf77593179257a43a6b83af0d061b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C3E0262130020486CE08BBB5B85E87DA38AABD1351F40143EF242831A3DE2C494A4252
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateFile
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 823142352-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 50dd765e8125d2160cd10d6c859b739a08b8a276e089b88899d424796b31df96
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4FD06C3204010DBBDF128F84DD06EDA3BAAFB48714F018000BE1856020C732E832AB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00791CBC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: InfoParametersSystem
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3098949447-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 666b9bc7056fadd4f3b1fa689200c29b2859419a5c5e8daec44f423b0fe6eb51
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2DC09236280304AFF6258B80BE4EF247764B758B00F099001F60AA96E3C3E26820EA90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0082961A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0082965B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0082969F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008296C9
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 008296F2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000011), ref: 0082978B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000009), ref: 00829798
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008297AE
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000010), ref: 008297B8
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008297E9
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00829810
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001030,?,00827E95), ref: 00829918
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0082992E
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00829941
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCapture.USER32(?), ref: 0082994A
                                                                                                                                                                                                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 008299AF
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008299BC
                                                                                                                                                                                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008299D6
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseCapture.USER32 ref: 008299E1
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00829A19
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00829A26
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829A80
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00829AAE
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829AEB
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00829B1A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00829B3B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00829B4A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00829B68
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00829B75
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00829B93
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829BFA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00829C2B
                                                                                                                                                                                                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 00829C84
                                                                                                                                                                                                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00829CB4
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829CDE
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00829D01
                                                                                                                                                                                                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 00829D4E
                                                                                                                                                                                                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00829D82
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00829E05
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 4a1f28d18568b38dfdee9ff48bffe747953bd6a735ddb6c99f88c26092201aa4
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72429B34204210AFDB20CF68DC48AAABBE5FF99310F15461DF699C72A1E771E8A1CF51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008248F3
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00824908
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00824927
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0082494B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0082495C
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0082497B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008249AE
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008249D4
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00824A0F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A56
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A7E
                                                                                                                                                                                                                                                                                                                                                                                                    • IsMenu.USER32(?), ref: 00824A97
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824AF2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824B20
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00824B94
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00824BE3
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00824C82
                                                                                                                                                                                                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 00824CAE
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824CC9
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824CF1
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00824D13
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824D33
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824D5A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 430862bed9ae922fcfb57a04011d0e35795da9d109c4434c3e9f75f878065796
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: aa01ab2cd42fd019fba34516a20200475caa48fe33463ee4adb058d5fc8d755c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 430862bed9ae922fcfb57a04011d0e35795da9d109c4434c3e9f75f878065796
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3212D071500228ABEB248F28ED49FBE7BF8FF85714F105129F516DA2E1DB749981CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007AF998
                                                                                                                                                                                                                                                                                                                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007EF474
                                                                                                                                                                                                                                                                                                                                                                                                    • IsIconic.USER32(00000000), ref: 007EF47D
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000009), ref: 007EF48A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 007EF494
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4AA
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 007EF4B1
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4BD
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4CE
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4D6
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 007EF4DE
                                                                                                                                                                                                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 007EF4E1
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF4F6
                                                                                                                                                                                                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 007EF501
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF50B
                                                                                                                                                                                                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 007EF510
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF519
                                                                                                                                                                                                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 007EF51E
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF528
                                                                                                                                                                                                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 007EF52D
                                                                                                                                                                                                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 007EF530
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 007EF557
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2d3897dfa6400a26ca3d656342a7f540263c416d755d12ca45cc08510e494c5c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD317471A40258BFEB316FB65C4AFBF7E6CFB48B50F104065FA01E61D1C6B49D11AAA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                                                                                                                                                                                                                                                                                                                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 007F1286
                                                                                                                                                                                                                                                                                                                                                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007F12A8
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 007F12B9
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007F12D1
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessWindowStation.USER32 ref: 007F12EA
                                                                                                                                                                                                                                                                                                                                                                                                    • SetProcessWindowStation.USER32(00000000), ref: 007F12F4
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007F1310
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10BF: CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: $default$winsta0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: eabfa917529a695045adf90a1b5bd1a43b14191de92c2eea20b591715e481c47
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 3387e1024a864a21c27968c27e2409fcd3b485cac4c2bc1541e1bb20b1e3d2a2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eabfa917529a695045adf90a1b5bd1a43b14191de92c2eea20b591715e481c47
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EA817871900249EFDF259FA8DC49BFE7BB9FF44704F148129FA11A62A0D7398945CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0BCC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0C00
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 007F0C17
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 007F0C51
                                                                                                                                                                                                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0C6D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 007F0C84
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0C8C
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 007F0C93
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0CB4
                                                                                                                                                                                                                                                                                                                                                                                                    • CopySid.ADVAPI32(00000000), ref: 007F0CBB
                                                                                                                                                                                                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0CEA
                                                                                                                                                                                                                                                                                                                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0D0C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0D1E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D45
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0D4C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D55
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0D5C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D65
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0D6C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0D78
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0D7F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 87e917a45c0ed873d60f689c491700a57f99fa2e7f34f4774ee8ded026841f66
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 00715C75A0020EABDF20DFA4DC45FFEBBB9BF04300F148515EA14A6392D775A906CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenClipboard.USER32(0082CC08), ref: 0080EB29
                                                                                                                                                                                                                                                                                                                                                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0080EB37
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClipboardData.USER32(0000000D), ref: 0080EB43
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 0080EB4F
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0080EB87
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 0080EB91
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0080EBBC
                                                                                                                                                                                                                                                                                                                                                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0080EBC9
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClipboardData.USER32(00000001), ref: 0080EBD1
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0080EBE2
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0080EC22
                                                                                                                                                                                                                                                                                                                                                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0080EC38
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClipboardData.USER32(0000000F), ref: 0080EC44
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0080EC55
                                                                                                                                                                                                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0080EC77
                                                                                                                                                                                                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080EC94
                                                                                                                                                                                                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080ECD2
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0080ECF3
                                                                                                                                                                                                                                                                                                                                                                                                    • CountClipboardFormats.USER32 ref: 0080ED14
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 0080ED59
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 420908878-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 08ccb7095ff6cdc30b60d8fc6a226bf15b8074d5f3d69deb092d368a5544fbae
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E7619935204205AFD710EF28DC99E3AB7A4FF84714F04891DF856D72A2CB35E906CBA2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 008069BE
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00806A12
                                                                                                                                                                                                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A4E
                                                                                                                                                                                                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A75
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806AB2
                                                                                                                                                                                                                                                                                                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806ADF
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a313c4aabc67a2b279c05082c132daf825af2ba28705b16824fafbaa467cbd9f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 37D15DB2508340EEC714EBA4DC85EABB7E8FF89704F44491DF585D6191EB38DA18CB62
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00809663
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 008096A1
                                                                                                                                                                                                                                                                                                                                                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 008096BB
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 008096D3
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 008096DE
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 008096FA
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0080974A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 00809768
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00809772
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0080977F
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0080978F
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 65070dd117a2c54228a01f108d7f41920a9ec575a44ff318598d138c8820a665
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1031F172541219AECB20EFB4EC09AEE77ACFF09320F108155F8A5E31E1EB35DE458A50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 008097BE
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00809819
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00809824
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00809840
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00809890
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 008098AE
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 008098B8
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 008098C5
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 008098D5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007FDB00
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0b29b097577971a94591eb8085efcce5d01ab285b588696a001104242ea885fc
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0431C571501619AEDB20EFB4EC48AEE77ACFF06320F108165E950E22D1DB35DD498A60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BF3E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0081BFA9
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0081BFCD
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0081C02C
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0081C0E7
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C154
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C1E9
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0081C23A
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C2E3
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081C382
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0081C38F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3102970594-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b007506125a8b127e35da7ba63655e9a52a4c164303a560dc16ce9f06431a6b6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 12042d6074a9fb7cef3ec8ba5b29fc551de4b4e5d705530a95eab6b8b37ad93a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b007506125a8b127e35da7ba63655e9a52a4c164303a560dc16ce9f06431a6b6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF022C71604200AFD714DF28C895E6ABBE9FF49318F18849DF45ACB2A2DB31ED46CB51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?), ref: 00808257
                                                                                                                                                                                                                                                                                                                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00808267
                                                                                                                                                                                                                                                                                                                                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00808273
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00808310
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00808324
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00808356
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0080838C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00808395
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b0d016f65493d0c55fbcc146c4f6b2bc6410b579ce76592a819203a6967cd945
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CE615972508705DFCB10EF64D8449AEB3E8FF89314F04892AF999C7291EB35E945CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007FD122
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 007FD1DD
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 007FD1F0
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD20D
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD237
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,007FD21C,?,?), ref: 007FD2B2
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 007FD253
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 007FD264
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3f0aaebfc227b29100fca08829198ac24a58a8f8e23cada6bf91ddfd719af62b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 04191d91f9bf6f52465efc0b8b95500bf80acb6f9107eb32e1f83c98e7282544
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3f0aaebfc227b29100fca08829198ac24a58a8f8e23cada6bf91ddfd719af62b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F617C3180110DEACF15EBE4DA969FDB7B6BF15300F208169E50177291EB396F09CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1737998785-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: bb1eecc316680dd2c4aec7f9a0ed8a77d646f7ab90a8dda14c185d0832c2ce75
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8C417E35204611DFE760DF15D848B2ABBA5FF44318F58C499E819CB6A2C775EC42CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                                                                                                                                                                                                                                                                                                                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 007FE932
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 44afdb9294037cbc9a906ebf56e6d56622e1916894a42899d225520d93447870
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A201DB72610219EBEB64A7749C89FBF729CAB14751F154521FE12E23E1D9E86C4081B1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00811276
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00811283
                                                                                                                                                                                                                                                                                                                                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 008112BA
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 008112C5
                                                                                                                                                                                                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 008112F4
                                                                                                                                                                                                                                                                                                                                                                                                    • listen.WSOCK32(00000000,00000005), ref: 00811303
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 0081130D
                                                                                                                                                                                                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 0081133C
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 540024437-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ec508aa8479262f5f4677ec24c773585f7a1b135f74fdd559990848d93d8cff5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB417D316001409FDB20DF24D488B69BBEAFF46318F18C198E9569F296C775EC82CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CB9D4
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CB9F8
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CBB7F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00833700), ref: 007CBB91
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0086121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007CBC09
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00861270,000000FF,?,0000003F,00000000,?), ref: 007CBC36
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CBD4B
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 314583886-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3f927b9fa1093a7b0ddc74359a7baf4e40fc87714646958d666d5eea06bc5476
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c040b7bcb7146d72ae5fd9d27295ca4566313aa01105d86901d4eb17b2553b6f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3f927b9fa1093a7b0ddc74359a7baf4e40fc87714646958d666d5eea06bc5476
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7C10471A04244EFCB20DF688C5AFAEBBA9EF41310F18419EF591D7252EB389E41CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007FD420
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD470
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD481
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 007FD498
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 007FD4A1
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5d29e3602c3ceacac4ada50f09f09f57b2f410069520c73429460c04c078f4d1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1c9008397c8bd582ac5b724000111ff6edef299f1866e6f7b06a465acd0feab2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d29e3602c3ceacac4ada50f09f09f57b2f410069520c73429460c04c078f4d1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B3319031008385EBC710EF64D8558BFB7E9BE91314F408A1DF9D593291EB28AE09D763
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: __floor_pentium4
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e5beb4df6eaee2b1ac73ac987d046b2329fc44e2ec0222b5e6bd4f1170046017
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FBC21B72E046288FDB25CE28DD45BEAB7B6EB48305F1541EED44DE7241E778AE818F40
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008064DC
                                                                                                                                                                                                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00806639
                                                                                                                                                                                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 00806650
                                                                                                                                                                                                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 008068D4
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: .lnk
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 886957087-24824748
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: beb57eb1727d87fd2c3c3f3300dd572f8244e3ba3f83329b05d8510d25f6ca2b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F7D16771508201AFD714EF24D885E6BB7E9FF98704F00492DF595CB2A1EB30E919CBA2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 008122E8
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0080E4EC: GetWindowRect.USER32(?,?), ref: 0080E504
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00812312
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00812319
                                                                                                                                                                                                                                                                                                                                                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00812355
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00812381
                                                                                                                                                                                                                                                                                                                                                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008123DF
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2387181109-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7c9e5c82ff1c150a47180dbac0b27e0e5661c3a9ccc10e68fbffe9b4e46f558a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a0ddd38641ed2b6b1a5b319bf4f7ad8d41003acb4e425e3e97b7a2aa16909f1e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c9e5c82ff1c150a47180dbac0b27e0e5661c3a9ccc10e68fbffe9b4e46f558a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3231FC72104305AFC720DF14C848BABBBADFF88314F000A19F994D72A1DB34EA59CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00809B78
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00809C8B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00803874: GetInputState.USER32 ref: 008038CB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00803874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00809BA8
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00809C75
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 550ddd6c60c5b4e53ac3df685cfc47eba43177a81d3869b04e318d8a7dab7795
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C3415D7190020AAFDF54DF64DC49AEEBBB8FF05310F248156E855E2192EB349E84CB61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 007A9A4E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 007A9B23
                                                                                                                                                                                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 007A9B36
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3131106179-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b70c9863afa87f6ccf1faf51e98147ac3fd007f0a3af4b3cf04d8856e6dfc925
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 77A12B7010A454BEE72C9A3D9C4DE7B3A9DFBC7344F15830AF602C6692CA2D9D61D272
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0081307A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                                                                                                                                                                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0081185D
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00811884
                                                                                                                                                                                                                                                                                                                                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 008118DB
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 008118E6
                                                                                                                                                                                                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 00811915
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1601658205-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f63b7758ce9b8d65172c948cf763552459ad3228474c2798a17fdccd5dfe83ab
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7351C271A002009FDB10AF24D88AF6A77E5EF49718F48C558F9059F3C3D775AD418BA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 292994002-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4f2f38281793db1489e538c32c8b2aeb619812f4a63fad0c2da86542bba6d4e2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e7a45d9df50a8f6afc4c8049a6f61efacfb05bd5c490f97fba0936bd961baa57
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4f2f38281793db1489e538c32c8b2aeb619812f4a63fad0c2da86542bba6d4e2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C221F9357402209FDB218F1AE848B2A7BE5FFA5314F69806CE846CB351C775EC82CB90
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-1546025612
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 974301e3b955ccde248a0c0b1c79022884b9df21816303eb6f9641f88a0bfc86
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3A29271E0061ACBDF64CF58D8407AEB7B1BF55310F2481AAE815AB385EB789D81CF91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 007FAAAC
                                                                                                                                                                                                                                                                                                                                                                                                    • SetKeyboardState.USER32(00000080), ref: 007FAAC8
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 007FAB36
                                                                                                                                                                                                                                                                                                                                                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 007FAB88
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 432972143-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1f00a8ae82c701095f22f29554fd7c022c8e3aea95d727f8a43e854d9f88cf4a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2431E7F0A4024CBEFF358A64CC05BFA7BA6BB44320F04821AE689567D1D37D8985D762
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 0080CE89
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 0080CEEA
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 0080CEFE
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 234945975-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fc2d3c9b1324e93e1d29ee5bf9addd2fed7c7428079ddd1231df8fd9192937a7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d1d93d45a02faf7428e7540e0cafd90b1009604fe8d440e13d7199934aa59bf5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fc2d3c9b1324e93e1d29ee5bf9addd2fed7c7428079ddd1231df8fd9192937a7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D7217AB1500605DBD7709F65CD48BAA77F8FB40358F20862AE646D2191EB74AA058B64
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007F82AA
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: lstrlen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ($|
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: edc5c4f791e35850d360c4f9a2443cc049dc3a18317bb51a542309ff71064e72
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f3f586babdcf63c422f9b535bde0ecd80988facaba6187fdb36a02a3e08385b2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: edc5c4f791e35850d360c4f9a2443cc049dc3a18317bb51a542309ff71064e72
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 20325574A00609DFCB68CF59C081A6AB7F0FF48710B11C56EE59ADB3A1EB74E981CB41
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00805CC1
                                                                                                                                                                                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00805D17
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(?), ref: 00805D5F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3541575487-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1b584282d0d0c11570c916a7912afcbcbdf790f4cc136098794888e3fe6cd250
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B9518675604A01DFC714CF28D898A9AB7E4FF49324F14856EE95A8B3A1DB34E904CFA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • IsDebuggerPresent.KERNEL32 ref: 007C271A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007C2724
                                                                                                                                                                                                                                                                                                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 007C2731
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3906539128-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 780563e998dfa7772f88585cf3f37d0919f7075f99a8be88ac9f6dc6cd9ab461
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A231B4749112189BCB21DF64DC89BDDB7B8BF08310F5085EAE41CA7261E7749F818F45
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 008051DA
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00805238
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 008052A1
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1682464887-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 890025b381fc7699ee46f775be1d96a3fa3ba8f6cc3f18d4cd79616bd6c6c4d4
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD316175A00518DFDB00DF54D889EAEBBB5FF49314F088099E805AB3A2DB35EC56CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                                                                                                                                                                                                                                                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                                                                                                                                                                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007F174A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 577356006-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ef6196f6097aa1db0fd88c95e6ca1b2591b41ae3d9721b91fb176a5806414b14
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A1191B2504308EFE728AF54DC8AD7AB7B9FB44714B20852EE05657241EB74BC428A60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD608
                                                                                                                                                                                                                                                                                                                                                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007FD645
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD650
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 33631002-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ceda65a3643ee56a87b00c06d9ac2d41906b3d8ea8a9085e41cf698d49147944
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 57115E75E05228BFDB208F95DC45FAFBBBCEB45B60F108115F904E7290D6704E058BA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007F168C
                                                                                                                                                                                                                                                                                                                                                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007F16A1
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeSid.ADVAPI32(?), ref: 007F16B1
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3429775523-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c75f1e9fb1eb370896fca2c36a82ce850ef8f056b3d8528975d299b4ddba53a5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64F0F47195030DFBDB00DFE49C89EAEBBBCFB08644F508565E501E2181E774AA448A54
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: /
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-2043925204
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 57d59c87001aa359438386c517fc3f3b6ca9eb021b3975d8fb767289316a42d6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8c84becdab953e581fd0b47bbe2f7be070efc48bf629b54f3b1b32fdf9e9749a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 57d59c87001aa359438386c517fc3f3b6ca9eb021b3975d8fb767289316a42d6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3A412872500659AFCB249FB9DC49FBB77B8EB84354F1082ADF909D7180E6749D41CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 007ED28C
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: NameUser
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: X64
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c38ff2dd1a63394ed9207fa7c204da530f5b596025507abcc9c54323b8bdd79a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 88D0C9B480111DEACBA4CB90DC88DDEB37CBB14305F104251F106A2000D77499498F10
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e0cbd1430cf070e8dfb52b5acbaaa1763c9e92cae761eed0445aa402b99277fe
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E021C72E001199FDF15CFA9C8807EEBBF1EF48314F25816AE919EB380D735A9418B94
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00806918
                                                                                                                                                                                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00806961
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 4f3ed29d8fe1fb562be3b48a4a3c94ea199503b043321a3eea4d22f664cdf527
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB119332614201DFCB10DF29D888A16BBE5FF85328F14C699F4698F6A2DB34EC15CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037E4
                                                                                                                                                                                                                                                                                                                                                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037F4
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3479602957-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 3889dacd2ad7a5fafc9f8679eae46027775b29a632907978cc72eb95dce59253
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3F0E5B06052286AEB6057B69C4DFEB3AAEFFC9761F000275F509D22C1D9609904C6B0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007FB25D
                                                                                                                                                                                                                                                                                                                                                                                                    • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 007FB270
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3536248340-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c890560050e39cb5da56cec97c4e80f032d5998e1d0e280e7561d9cf75e16b3a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A1F01D7180424DABDF159FA4C805BBE7BB4FF08305F108009F955A5191C37DC6119F94
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 81990902-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 116a90448fb27aa4071462469f9dc767cbfebc459b21e57d31ca4fe285bd02ef
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 43d6fbc30e1f94a128e218c52d6d5e078cd3779ee0c2f0cf7dd09f5a5f6ea8c1
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 116a90448fb27aa4071462469f9dc767cbfebc459b21e57d31ca4fe285bd02ef
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0FE04F32008600EEE7352B61FC09E7777E9FB04320F20C92DF5A5804B1DB626CA1DB54
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    • Variable is not of type 'Object'., xrefs: 007E0C40
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-1840281001
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2b54aed8b405e40f453eaca81005fc276ced74669ed8c5009bff0f9d00f35374
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 507e7acc3c452a09c9c0fc598bffc05bd2948282b38a2d22031383c958972cb0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b54aed8b405e40f453eaca81005fc276ced74669ed8c5009bff0f9d00f35374
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA32B071A00218DFCF15DF94E985AEDB7B5FF09304F244069E806AB292D77DAE45CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007C6766,?,?,00000008,?,?,007CFEFE,00000000), ref: 007C6998
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ExceptionRaise
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3997070919-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6b35f7d625804dd395cd3bf9883673a4bb02331b3f18c55017d697f8069cdddc
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4BB107716106099FDB15CF28C4CAB697BE0FF45364F25865CE89ACF2A2C739E991CB40
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-3916222277
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6412c816050d989cc5dbc7c8e72aa33196b09ee8131d5c21f221eaea0b2b5c78
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 60126F71900269DFCB54CF59C8806EEB7B5FF49310F14819AE849EB256EB389E81CF91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • BlockInput.USER32(00000001), ref: 0080EABD
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: BlockInput
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3456056419-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 98c47bc4ab179aef1765087e19e3ac59249e204c95f8fceb7449949a83d97e0d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0BE012322002149FCB10DF59E804D5AB7D9FF68760F008416FC49C7291D674A8418B90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007B03EE), ref: 007B09DA
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3192549508-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: af1bc35d23e2399a57af8c80792b50b17d8556278b317bb58204e7ba9afe0d3b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0947600d16f4d78c414a9cbbe09c27318584e10632c7905776673dbe026ad83c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7351797160C7459BDF3C8978889EBFE67999BD2340F180909E882DB282CA1DFE41D356
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 85f66951ecf42f89dd533548d2212f61aea9f79617c4cc87209f7d6fd2982288
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE322032D29F414DD7279634D822335A789AFB73D5F14DB2BE81AB59A6EF29C4838100
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 75338121a62093a7d4497d064214123989f63b6e272ad52ed86cbdcba671e2b5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC326C35A052859FDF2BCF2AC49067D77A1EB8E310F28866AD449CB291D63CDD83DB11
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 920c63702538bd9e2461c7e4ab4936600ebe34b311993002f54558e7260ca93a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e4474a663191a78b494dd3bac9cbd92e27d1316545f0dfafaffed3733b68b348
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 920c63702538bd9e2461c7e4ab4936600ebe34b311993002f54558e7260ca93a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 392291B0A04609DFDF14DFA8D885AAEB7B5FF44300F14462AE816A7391EB39ED15CB50
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a3017bbeb09554709f39cb46d366b414ccb508dd7d2cb95bdd5638063d5a2fb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 210afb9fe1647cd6d29311d207cb8bf91705a387fdff33469fcb0ae1766e5990
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a3017bbeb09554709f39cb46d366b414ccb508dd7d2cb95bdd5638063d5a2fb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E02A8B1E00205EBDF05EF64D885AADB7B1FF44300F11816AE9169B391EB39EE51CB91
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d50a71d2ab997734502fa7184cb3b6cf1a394dff8fc74e8a311b8fcbe152bc39
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 63B1DF20D2AF414DD62396399831336B65CBFFB6D5F91DB1BFC1674E22EB2686834140
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b6c65f68496dda2495bb1f60ab21c3b12370484ba0811112d50b7dc273c86e36
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EF918A722090E34EDB29463D85742BEFFE15A523A23DA079DD4F2CB1C5FE18D554D620
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e15677cf5abb354c37d063c178826bda3c72f5755b7c967f213b0117db2a9079
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3D91977220A0E74DDB69423D84342BEFFE15A923A135A079DE4F2CB1C6EE28D955D720
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c77933ce8837816d6e62b04d9da987beeba9cce0451de227ad0e909aeebd0472
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A191C7722090E34EDB2D427A84782BEFFE15A923A13DA479ED4F2CA1C5FE18D554D620
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 16c4990eaf2a9a89a6afe561cc9cba91634638a96ce7b68e5c2ea0361c09ff1d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F6158B1208709A6DE7C9A2C8C99BFF2398DFC1700F14491DF942DB2C1DA1D9E42CB66
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7a8325083ccde233944252fb85974602253e76dee0ee42e630ffc4a263ba0a50
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E616B7170870996DE3C5A2888AABFF2398DFC2784F140959E943DF681DA1EED42C356
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5476f6c61ce6310007842f3624b7063137bca70e0b115320b0732fc79c2f3415
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC8186336090E349DB2D423A85346BEFFE16A923B13DA079DD4F2CB1C1EE28D554D620
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2de44db092f6c16f8ef519faeb430bbc6009c0fa534deaaf62e2f36868b44145
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3E21A8326206118BD728CE79C81667A73E5F764310F15866EE4A7C37D0DE75A904CB40
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00812B30
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00812B43
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32 ref: 00812B52
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00812B6D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00812B74
                                                                                                                                                                                                                                                                                                                                                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00812CA3
                                                                                                                                                                                                                                                                                                                                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00812CB1
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812CF8
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00812D04
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00812D40
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D62
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D75
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D80
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00812D89
                                                                                                                                                                                                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D98
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00812DA1
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DA8
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00812DB3
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DC5
                                                                                                                                                                                                                                                                                                                                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,0082FC38,00000000), ref: 00812DDB
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00812DEB
                                                                                                                                                                                                                                                                                                                                                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00812E11
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00812E30
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812E52
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0081303F
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 40726c38ef8819e61b32013846eb22f583c60654fabf7037ca03d33f8eea346c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F1025871900218EFDB24DF64DD89EAE7BB9FF48710F048158F915AB2A1CB74AD51CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 0082712F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00827160
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 0082716C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,000000FF), ref: 00827186
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00827195
                                                                                                                                                                                                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 008271C0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000010), ref: 008271C8
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 008271CF
                                                                                                                                                                                                                                                                                                                                                                                                    • FrameRect.USER32(?,?,00000000), ref: 008271DE
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 008271E5
                                                                                                                                                                                                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00827230
                                                                                                                                                                                                                                                                                                                                                                                                    • FillRect.USER32(?,?,?), ref: 00827262
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00827284
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: GetSysColor.USER32(00000012), ref: 00827421
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: SetTextColor.GDI32(?,?), ref: 00827425
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: GetSysColor.USER32(0000000F), ref: 00827446
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: GetSysColor.USER32(00000011), ref: 00827463
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: SelectObject.GDI32(?,00000000), ref: 00827482
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: SelectObject.GDI32(?,?), ref: 00827498
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 008273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4124339563-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c55fbc6f4322773f3ae005e0cae01a6109b06d716019a0444307db84d3c690e8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: efc8f9389f1a49955b8a1d58b8d6ba25f651557c7fed1fbb0c7e3d619a124442
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c55fbc6f4322773f3ae005e0cae01a6109b06d716019a0444307db84d3c690e8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3A1AE72008311EFDB209F61DC49A6F7BA9FF89320F104A19F962D61E1D774E945CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?,?), ref: 007A8E14
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 007E6AC5
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007E6AFE
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007E6F43
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001053), ref: 007E6F7F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007E6F96
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FAC
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FB7
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a7d8e33c8a9b13272e37dfb0be76833e3326fcec1774a8ba315659746f3d6a94
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E312B030206241DFDB65CF25C848BA9BBE1FB69340F588569F545CB262CB39EC52CF52
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000), ref: 0081273E
                                                                                                                                                                                                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0081286A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008128A9
                                                                                                                                                                                                                                                                                                                                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008128B9
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00812900
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 0081290C
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00812955
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00812964
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00812974
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00812978
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00812988
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00812991
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteDC.GDI32(00000000), ref: 0081299A
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008129C6
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 008129DD
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00812A1D
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00812A31
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00812A42
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00812A77
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00812A82
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00812A8D
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00812A97
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d91a4a98165dd2f279b074ef8f86646d399dda04647d875c6fa4b757e0875dfe
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3EB17B71A00219AFEB24DF68DD4AEAE7BA9FF08710F008114FA15E7291D774ED50CB94
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00804AED
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDriveTypeW.KERNEL32(?,0082CB68,?,\\.\,0082CC08), ref: 00804BCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,0082CB68,?,\\.\,0082CC08), ref: 00804D36
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 14c6c26b038800a519fae89d0ff6887ddfb7aeeecbf182ac419b8b8f44df8880
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8c98d2d3bacbf36325ea7e370d7aaedc803c0ac8a650b0d23aae8c353e054fbd
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 14c6c26b038800a519fae89d0ff6887ddfb7aeeecbf182ac419b8b8f44df8880
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B561EEB028110AEBDBA4DB24CE8297877B0FB04305B649415FE06EB2D1EB3AED55DB41
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000012), ref: 00827421
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 00827425
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00827446
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateSolidBrush.GDI32(?), ref: 0082744B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000011), ref: 00827463
                                                                                                                                                                                                                                                                                                                                                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00827482
                                                                                                                                                                                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00827498
                                                                                                                                                                                                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                                                                                                                                                                                                                                                                                                                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0082752A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00827554
                                                                                                                                                                                                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00827572
                                                                                                                                                                                                                                                                                                                                                                                                    • DrawFocusRect.USER32(?,?), ref: 0082757D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000011), ref: 0082758E
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00827596
                                                                                                                                                                                                                                                                                                                                                                                                    • DrawTextW.USER32(?,008270F5,000000FF,?,00000000), ref: 008275A8
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 008275BF
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 008275CA
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 008275D0
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 008275D5
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 008275DB
                                                                                                                                                                                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,?), ref: 008275E5
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1996641542-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a21910d99ba09103dc49b63c37e5c15ea3f65319853b28a49e308f69911e55c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: bd3bfc4ce18ef433bbebce3adce7eea7005a960ea5226d0d9b2bb93a945ef838
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a21910d99ba09103dc49b63c37e5c15ea3f65319853b28a49e308f69911e55c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C616F72904218AFDF119FA4DC49EAEBFB9FF08320F118115F915AB2A1D7749941DF90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00821128
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 0082113D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00821144
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00821199
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 008211B9
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008211ED
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0082120B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0082121D
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00821232
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00821245
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindowVisible.USER32(00000000), ref: 008212A1
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008212BC
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008212D0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 008212E8
                                                                                                                                                                                                                                                                                                                                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 0082130E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00821328
                                                                                                                                                                                                                                                                                                                                                                                                    • CopyRect.USER32(?,?), ref: 0082133F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 008213AA
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ec3674ef39f87b4ca5fde797a60ab518ea3f2b2751faa928fc285c1c9e63e8eb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AAB18971604350EFDB10DF64E888A6ABBE5FF98340F10891CF999DB261C735E885CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 008202E5
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0082031F
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00820389
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008203F1
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00820475
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008204C5
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00820504
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007F2258
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007F228A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1103490817-719923060
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 39550d434ca3b935465b117b4e19904f7b73831bd0ef7115c0434c600389513b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ec33a9a94d4e8b0c7c1f3fb2b4d0181be78aab717581943a8fb5710ccda59864
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39550d434ca3b935465b117b4e19904f7b73831bd0ef7115c0434c600389513b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 87E19D31208215DBCB14DF24E55582AB3E6FF98318B14895DF896EB3A2DB34ED85CB81
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A8968
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000007), ref: 007A8970
                                                                                                                                                                                                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A899B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000008), ref: 007A89A3
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000004), ref: 007A89C8
                                                                                                                                                                                                                                                                                                                                                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007A89E5
                                                                                                                                                                                                                                                                                                                                                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007A89F5
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007A8A28
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007A8A3C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 007A8A5A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 007A8A76
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 007A8A81
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: GetCursorPos.USER32(?), ref: 007A9141
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTimer.USER32(00000000,00000000,00000028,007A90FC), ref: 007A8AA8
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5733f870c1ea37d9d53139212c2df07dc91ebd632b0752fe4b737fd73936a9f0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1EB16771A002099FDF24DFA8CD49BAE7BA5FB48314F158229FA15E7290DB78E841CB51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0DF5
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0E29
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 007F0E40
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 007F0E7A
                                                                                                                                                                                                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0E96
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 007F0EAD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0EB5
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 007F0EBC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0EDD
                                                                                                                                                                                                                                                                                                                                                                                                    • CopySid.ADVAPI32(00000000), ref: 007F0EE4
                                                                                                                                                                                                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0F13
                                                                                                                                                                                                                                                                                                                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0F35
                                                                                                                                                                                                                                                                                                                                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0F47
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F6E
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0F75
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F7E
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0F85
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F8E
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0F95
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0FA1
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F0FA8
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: deba33db624cda877c14a548fcc09d6170fe1452e487c8f6d2956bff394a85f2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5F714F7190020AEBDF209FA4DC49FBEBBB8BF04310F148115FA19A6352D7759A15CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081C4BD
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,0082CC08,00000000,?,00000000,?,?), ref: 0081C544
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0081C5A4
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081C5F4
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081C66F
                                                                                                                                                                                                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0081C6B2
                                                                                                                                                                                                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0081C7C1
                                                                                                                                                                                                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0081C84D
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0081C881
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0081C88E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0081C960
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 9721498-966354055
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4aaafac7f9be09e84275afb0b6b25ad0cfeae60c6da78c5ee4aa131c79ee214a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 434f3b16bdd54d061d7bac9036be9f70de0476387fc9a51ecedbe5c16e552ad2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4aaafac7f9be09e84275afb0b6b25ad0cfeae60c6da78c5ee4aa131c79ee214a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 69126835608201DFDB14DF24D885A6AB7E9FF88714F05885CF89A9B3A2DB35ED41CB81
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 008209C6
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00820A01
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00820A54
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00820A8A
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00820B06
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00820B81
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007F2BFA
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8ae43ea0a0d4ebaea5cdd553971ac29ddaf9d9f2415634221645e46a8a80ac16
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D2E16A32208321DFCB14DF24D45092AB7E2FF98318B558A5DF8969B362D735ED89CB81
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ac088f5333aab3a5c0ed15537e2b3a23f7048a2d54e1cf4aa84a96cfe2fe3367
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 594931b0f206e970918ddfe47936ab2763dc716a22efd50d71aedfb8ceb2145a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ac088f5333aab3a5c0ed15537e2b3a23f7048a2d54e1cf4aa84a96cfe2fe3367
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9C71F37268412A8BCB20DE6CD9416FF3399FFA1764B254128FC66D7284E635DDC8C3A0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0082835A
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0082836E
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00828391
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008283B4
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008283F2
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00825BF2), ref: 0082844E
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828487
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008284CA
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828501
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 0082850D
                                                                                                                                                                                                                                                                                                                                                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0082851D
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyIcon.USER32(?,?,?,?,?,00825BF2), ref: 0082852C
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00828549
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00828555
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 439021fd78480377417c5ff7736219d6ad8338b6d08477ccdbc59b5bb3b9081c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 05619E71500629FAEF24DF64EC45BBE77A8FF08B11F108509F815E61D1DB74AA91CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-1645009161
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 35d3c3cd9e629794421d85f2a361689f5c274983adb0fb6ca8edba5cfc30f179
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 00a2e6790f4a8dfe976cb40be8217dabb66bdb072d0e8ef1b0b63ce68f17261b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 35d3c3cd9e629794421d85f2a361689f5c274983adb0fb6ca8edba5cfc30f179
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1B81FF71614605FBDF28AFA0EC46FAE37B9BF15300F044025F914AA292EB7DDA51C6A1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CharLowerBuffW.USER32(?,?), ref: 00803EF8
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00803F03
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00803F5A
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00803F98
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDriveTypeW.KERNEL32(?), ref: 00803FD6
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0080401E
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00804059
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00804087
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8e660d1ada978a23e48fbaaf29143875e8ad8edbc720d5d03f86a8d9509cb854
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2bd18acbe70952d7ba9fc189324d812493a28586e7b958e8e465a3a8ef5eb1ff
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e660d1ada978a23e48fbaaf29143875e8ad8edbc720d5d03f86a8d9509cb854
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CB71D0726042029FC750EF24C88086AB7F4FF94768F504A2DF995D7291EB35ED49CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadIconW.USER32(00000063), ref: 007F5A2E
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007F5A40
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 007F5A57
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 007F5A6C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 007F5A72
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 007F5A82
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 007F5A88
                                                                                                                                                                                                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007F5AA9
                                                                                                                                                                                                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007F5AC3
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 007F5ACC
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007F5B33
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 007F5B6F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 007F5B75
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 007F5B7C
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 007F5BD3
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 007F5BE0
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 007F5C05
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007F5C2F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 895679908-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5dde087c220daeefb9297f2d7072f33f2578c03c59e01f9456e85cfadf558bf0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C6715E71900B09EFDB20DFA8CE89A7EBBF5FF48704F104519E642A26A0D779E945CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 0080FE27
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0080FE32
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0080FE3D
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 0080FE48
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0080FE53
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 0080FE5E
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 0080FE69
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 0080FE74
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 0080FE7F
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 0080FE8A
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 0080FE95
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 0080FEA0
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0080FEAB
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 0080FEB6
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0080FEC1
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 0080FECC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorInfo.USER32(?), ref: 0080FEDC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0080FF1E
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3215588206-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 198e6bc944b30feb5f9f54974b6ef8ce37ad2ca9feb30931b62cbe9db2de02ac
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 064168B0D043196ADB60DF768C8985EBFE8FF04754B50852AF11DE7681DB789901CF91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007B00C6
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0086070C,00000FA0,E85D3952,?,?,?,?,007D23B3,000000FF), ref: 007B011C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0127
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0138
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007B014E
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007B015C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007B016A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B0195
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B01A0
                                                                                                                                                                                                                                                                                                                                                                                                    • ___scrt_fastfail.LIBCMT ref: 007B00E7
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007B0122
                                                                                                                                                                                                                                                                                                                                                                                                    • SleepConditionVariableCS, xrefs: 007B0154
                                                                                                                                                                                                                                                                                                                                                                                                    • InitializeConditionVariable, xrefs: 007B0148
                                                                                                                                                                                                                                                                                                                                                                                                    • WakeAllConditionVariable, xrefs: 007B0162
                                                                                                                                                                                                                                                                                                                                                                                                    • kernel32.dll, xrefs: 007B0133
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: bc20af31da7cb3a645cf387c5314d5bc3eb69a6d135ab3dc9ccc3b9687990ff8
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF21FC72644718ABD7245BA4AC0ABAF77E4FB45B51F014535F911E3391DB7C9800CAD4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d7a4b4c4c2fbf84cf07147c49b4fb430c72213f925291a7680713aca9de86738
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5E1C532A0051AEBCB14DFB8C455BFDBBB0BF54710F548219EA56E7340DB38AE899790
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CharLowerBuffW.USER32(00000000,00000000,0082CC08), ref: 00804527
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0080453B
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00804599
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008045F4
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0080463F
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008046A7
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDriveTypeW.KERNEL32(?,00856BF0,00000061), ref: 00804743
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 97ffdc9563e65ad492af33957a03e6995ae3670c335bf489c7db3d938a99c182
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4BB11FB16483029FC750DF28DC90A6AB7E5FFA5720F505A1CF6A6C32D1E734D844CA92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,0082CC08), ref: 008140BB
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008140CD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0082CC08), ref: 008140F2
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,0082CC08), ref: 0081413E
                                                                                                                                                                                                                                                                                                                                                                                                    • StringFromGUID2.OLE32(?,?,00000028,?,0082CC08), ref: 008141A8
                                                                                                                                                                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(00000009), ref: 00814262
                                                                                                                                                                                                                                                                                                                                                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008142C8
                                                                                                                                                                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 008142F2
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 354098117-199464113
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3bb51c217dfe036ba6b66a7bb37a3fe21ab14f0b7e41b52f4d2c470f276cbb17
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8b5d51da787d9b62f9046059c3c341576e69c0078b8a8629a41e6c544f4bdb55
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3bb51c217dfe036ba6b66a7bb37a3fe21ab14f0b7e41b52f4d2c470f276cbb17
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48122B75A00119EFDB14DF94C884EAEB7B9FF49318F248098E905EB251D731ED86CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemCount.USER32(00861990), ref: 007D2F8D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemCount.USER32(00861990), ref: 007D303D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 007D3081
                                                                                                                                                                                                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 007D308A
                                                                                                                                                                                                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(00861990,00000000,?,00000000,00000000,00000000), ref: 007D309D
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007D30A9
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1a53c54bdf5946853897738594fe9bba358da2d5b856df5134239b895e437820
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 02c70986d88c7a395dbf2a68e260d3065e9c7be3eac87e15c556e9f4a0ab87ca
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1a53c54bdf5946853897738594fe9bba358da2d5b856df5134239b895e437820
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F8713831644205BEEB218F24DD49FAEBF75FF05324F204207F524AA2E1C7B9A912CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000,?), ref: 00826DEB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00826E5F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00826E81
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826E94
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00826EB5
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00790000,00000000), ref: 00826EE4
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826EFD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00826F16
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00826F1D
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00826F35
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00826F4D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f281788b7991f7896b8b3265c647370b20b6a04bebae8b1cd665f1f0450cf583
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D718774104244AFDB21CF18EC48FBABBE9FB88304F54441DF999D7261EB70A956CB11
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • DragQueryPoint.SHELL32(?,?), ref: 00829147
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00827674: ClientToScreen.USER32(?,?), ref: 0082769A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00827674: GetWindowRect.USER32(?,?), ref: 00827710
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00827674: PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 008291B0
                                                                                                                                                                                                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008291BB
                                                                                                                                                                                                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008291DE
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00829225
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0082923E
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00829255
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00829277
                                                                                                                                                                                                                                                                                                                                                                                                    • DragFinish.SHELL32(?), ref: 0082927E
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00829371
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1e9fb36b658e1efe701474a6e69a5557ce8f71ba6fc23f76b3c8387de6d2f690
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C617C71108301AFD701DF64EC89DAFBBE8FF99350F40491DF695922A1DB349A49CBA2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C4B0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C4C3
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C4D7
                                                                                                                                                                                                                                                                                                                                                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0080C4F0
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0080C533
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0080C549
                                                                                                                                                                                                                                                                                                                                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C554
                                                                                                                                                                                                                                                                                                                                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C584
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C5DC
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C5F0
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0080C5FB
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: df2e09b39e59a3e6cf63d3726b01f7d08b11ef9278705539f2ccf1ee09a8402a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6B514AB5500608BFDB718F64CD88ABB7BBCFF08754F108619F945D6290DB34E9459BA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00828592
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285A2
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285AD
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285BA
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 008285C8
                                                                                                                                                                                                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285D7
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 008285E0
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285E7
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285F8
                                                                                                                                                                                                                                                                                                                                                                                                    • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0082FC38,?), ref: 00828611
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00828621
                                                                                                                                                                                                                                                                                                                                                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00828641
                                                                                                                                                                                                                                                                                                                                                                                                    • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00828671
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00828699
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008286AF
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3840717409-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 671b0dff41a313f157185d31d543efb55114d433fda2bcec0732fe6ac3c8cf95
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9E411975601218EFDB21DFA5DD48EAE7BB8FF99715F108058F909E7260DB30A942CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(00000000), ref: 00801502
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 0080150B
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00801517
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008015FB
                                                                                                                                                                                                                                                                                                                                                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 00801657
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00801708
                                                                                                                                                                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 0080178C
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 008017D8
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 008017E7
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(00000000), ref: 00801823
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ad7f24d5db209d6dbf1397f3307f74bda0af65c137ed21b54fc2bdcedeb27412
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71D1DD32A00619EBDF50AF64EC8EA7DB7B5FF45724F14815AE406EB1C0DB34A841DBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081B6F4
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081B772
                                                                                                                                                                                                                                                                                                                                                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 0081B80A
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0081B87E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0081B89C
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0081B8F2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081B904
                                                                                                                                                                                                                                                                                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081B922
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 0081B983
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0081B994
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 737e3100edc9977c6fdeebce40ae307fb3036e297e4d5c8a7d3d36e53518ddf0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2AC17D31204201EFDB14DF14C495F6ABBE5FF84318F14855CE55A8B2A2DB75EC86CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 008125D8
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008125E8
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 008125F4
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00812601
                                                                                                                                                                                                                                                                                                                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0081266D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008126AC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008126D0
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 008126D8
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 008126E1
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteDC.GDI32(?), ref: 008126E8
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 008126F3
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: (
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d08aa4a19f56ecc379a1500778a52f7dc12e0cf577a7c18d74f795623cbd373e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ed4a05cfda1c9a04da96c477f4b3848e8cd7d302140903ba04ac77bbd232a1b8
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d08aa4a19f56ecc379a1500778a52f7dc12e0cf577a7c18d74f795623cbd373e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1061D275D00219EFCF14CFA8D885AAEBBB9FF48310F208529E955A7250D770A951CF94
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ___free_lconv_mon.LIBCMT ref: 007CDAA1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD659
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD66B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD67D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD68F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6A1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6B3
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6C5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6D7
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6E9
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6FB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD70D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD71F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD731
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDA96
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDAB8
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDACD
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDAD8
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDAFA
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB0D
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB1B
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB26
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB5E
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB65
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB82
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CDB9A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 161543041-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 58c84757230f259096f9c1d5ea32653a62fa4655864c432f7d64943a74928fb4
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1D313771604705DFEB31AA79E849F5AB7E9FF00311F15842DE449E71A2DA39BC81CB20
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 007F369C
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007F36A7
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007F3797
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 007F380C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 007F385D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 007F3882
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 007F38A0
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(00000000), ref: 007F38A7
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 007F3921
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 007F395D
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %s%u
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 10279f71db097cdafafe08ced29f4aca3fb29342dc931eb2f89b9abbbd199510
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7491B57120460AEFD715DF24C885BFAF7A8FF44354F008619FA99D2250DB78EA45CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 007F4994
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 007F49DA
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007F49EB
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 007F49F7
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 007F4A2C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4A64
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 007F4A9D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4AE6
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 007F4B20
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 007F4B8B
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ThumbnailClass
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: adfb6fcb2845df5fa02704e860ce794b7864579af8e5bb80d2b46187105553d4
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39918C711042099FDB14DF14C985BBB77E8FF84314F048469FE859A296EB38ED45CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00828D5A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFocus.USER32 ref: 00828D6A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(00000000), ref: 00828D75
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00828E1D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00828ECF
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemCount.USER32(?), ref: 00828EEC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00828EFC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00828F2E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00828F70
                                                                                                                                                                                                                                                                                                                                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00828FA1
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1026556194-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e53bb24def3cc83d9f39bc608147546b5e09be2334b4497483b1ef8833204f84
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7e1e7752816ad8be9e5fdcfd4540267a82ce6c4f739f431835e98a0af92880fe
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e53bb24def3cc83d9f39bc608147546b5e09be2334b4497483b1ef8833204f84
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2E81BF71509321EFDB20CF14E984AAB7BE9FF88314F040919F984D7291DB70D985CBA2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(00861990,000000FF,00000000,00000030), ref: 007FBFAC
                                                                                                                                                                                                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(00861990,00000004,00000000,00000030), ref: 007FBFE1
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(000001F4), ref: 007FBFF3
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemCount.USER32(?), ref: 007FC039
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 007FC056
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 007FC082
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,?), ref: 007FC0C9
                                                                                                                                                                                                                                                                                                                                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007FC10F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FC124
                                                                                                                                                                                                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FC145
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4c70dcbd33fb842efe7b1187dd1b054d0524fe1a108f5f0fc601c6af5e6acd7e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a5892fc5b7b00fc4b64efd56b91c63b33bcc342128703eceab208baca5d62647
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4c70dcbd33fb842efe7b1187dd1b054d0524fe1a108f5f0fc601c6af5e6acd7e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 056182B090024DEFDF22CF64CE88ABE7BA8FB05354F144555EA11A7391D739AD15CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007FDC20
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007FDC46
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FDC50
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 007FDCA0
                                                                                                                                                                                                                                                                                                                                                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007FDCBC
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1939486746-1459072770
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: aa351c2b3da67c43c8e3ffbc3de47a686b94f27e1fb7b6d17d03a694aa9efc1b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 44c0b9adb4379581a956db3f8cd2b5811d63116b51d307f481dfc11d9f0a302f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa351c2b3da67c43c8e3ffbc3de47a686b94f27e1fb7b6d17d03a694aa9efc1b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F412A72644205BADB24A7749C4BFFF776CEF56710F10016AFA00E6282EB7C9D0196A4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CC64
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0081CC8D
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD48
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0081CCAA
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0081CCBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081CCCF
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD05
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CD28
                                                                                                                                                                                                                                                                                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081CCF3
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d6388a366479813e1de374e0a6d620a47c2895ef81f932771f28ce3d12a0d4f1
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CC316C71941129BBDB308B55EC88EFFBB7CFF55750F004165A906E2240DA749E86DAE0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00803D40
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00803D6D
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00803D9D
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00803DBE
                                                                                                                                                                                                                                                                                                                                                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00803DCE
                                                                                                                                                                                                                                                                                                                                                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00803E55
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00803E60
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00803E6B
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: :$\$\??\%s
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 596c0f9f68e50f9ce3af321ccccbe38eebfdca983929f62f1cc03331426297dc
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E318171900209ABDB219BA0DC49FEF77BCFF89740F1041A6F915D61A0EB7497458B24
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • timeGetTime.WINMM ref: 007FE6B4
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AE551: timeGetTime.WINMM(?,?,007FE6D4), ref: 007AE555
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A), ref: 007FE6E1
                                                                                                                                                                                                                                                                                                                                                                                                    • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 007FE705
                                                                                                                                                                                                                                                                                                                                                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007FE727
                                                                                                                                                                                                                                                                                                                                                                                                    • SetActiveWindow.USER32 ref: 007FE746
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007FE754
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 007FE773
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(000000FA), ref: 007FE77E
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindow.USER32 ref: 007FE78A
                                                                                                                                                                                                                                                                                                                                                                                                    • EndDialog.USER32(00000000), ref: 007FE79B
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: BUTTON
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a1d0c44a567786e306272527ba064686cd3bd01d76c9b405a361067d2099f0a2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D21A8B0200608EFEB10AFA4ED8DA393B69F764749F115425F612C13B1DBB99C119B24
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007FEA5D
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007FEA73
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FEA84
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007FEA96
                                                                                                                                                                                                                                                                                                                                                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007FEAA7
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: SendString$_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2b5d675d2e38caf526063573cb4abb6f41d140578bca63fac57e00315dd97a4b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8119131A90219B9EB20A7A5EC4ADFF6A7CFBD1F00F4044297911E31E0FE781919C5B0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 007FA012
                                                                                                                                                                                                                                                                                                                                                                                                    • SetKeyboardState.USER32(?), ref: 007FA07D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 007FA09D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(000000A0), ref: 007FA0B4
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 007FA0E3
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(000000A1), ref: 007FA0F4
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 007FA120
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000011), ref: 007FA12E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 007FA157
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000012), ref: 007FA165
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 007FA18E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(0000005B), ref: 007FA19C
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 541375521-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5adf4abc0fe0bfc15772ee801bcbdaf6e1176955cecd067c4932c9b028711561
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 658c0e65ea2b51045162d72eecac906b3a104506a8ce19a714be17ea8cb5453c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5adf4abc0fe0bfc15772ee801bcbdaf6e1176955cecd067c4932c9b028711561
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3651986090478C79FB35DB608815BFAAFF59F12380F088599D7C6573C2EA58AA4CC762
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 007F5CE2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 007F5CFB
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 007F5D59
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 007F5D69
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 007F5D7B
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 007F5DCF
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 007F5DDD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 007F5DEF
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 007F5E31
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 007F5E44
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007F5E5A
                                                                                                                                                                                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 007F5E67
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3096461208-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: df086a5b86fa7af2e91444132192f0b30a68963cbb4924b11cab7cd7a4ec1313
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D51FD71B00609AFDB18CF68DD89ABEBBB5FB58310F148229FA15E6290D7749E05CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 007A8C81
                                                                                                                                                                                                                                                                                                                                                                                                    • KillTimer.USER32(00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8D1B
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 007E6973
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69A1
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69B8
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000), ref: 007E69D4
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 007E69E6
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 641708696-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5593044dc355e06bed2a3a1c0baa2acda0dc3567fe9ce8c07ac6217d61912cb6
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E61CF30502640DFCB759F15C948B39BBF1FB95322F14966CE04297661CB79AC91CF62
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 007A9862
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ColorLongWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 259745315-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0a54125820bb350b53c13f0be5c1a7767eece7db74611fd66ed35570c21e2458
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF418F31105640AFDB305F389C89BB93B65BB87321F148715FAA2871E1D77D9C62DB10
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: .{
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-1852962426
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ab936efb722ea5e9237c30e194172dd80fc5a260fb85205e446c0af0a29a7d09
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0f5b7d358a80d577511591812af26291292ecbb365acb0f1d209004dc265aaad
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ab936efb722ea5e9237c30e194172dd80fc5a260fb85205e446c0af0a29a7d09
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 96C1E47590424AEFDB51DFA8D849FEDBBB0BF09310F04409DE915AB392CB789981CB61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 007F9717
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9720
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 007F9742
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9745
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 007F9866
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: be912dba7186dd1a5c49d0251d3ce903adf70e5dbad626e70b1cf8fb509f2e5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f6eb78a52f2fec9f9f380ec997ebacaf34fa59e09d6a7693c5145c06b94597f7
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: be912dba7186dd1a5c49d0251d3ce903adf70e5dbad626e70b1cf8fb509f2e5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 97413D72800209EADF04EBE4ED4AEFEB778AF55340F504169F60572192EB696F48CA61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007F07A2
                                                                                                                                                                                                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007F07BE
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007F07DA
                                                                                                                                                                                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007F0804
                                                                                                                                                                                                                                                                                                                                                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 007F082C
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F0837
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F083C
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 323675364-22481851
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 531053bbef292b8ded272602192bf614a72580e5d910a45e3f9f25e51f20fcdd
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9F410872C10629EBDF21EBA4EC99CFDB778FF04350B044169E911A3261EB385E04CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0082403B
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00824042
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00824055
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0082405D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00824068
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteDC.GDI32(00000000), ref: 00824072
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0082407C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00824092
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0082409E
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: static
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4128cb268c1962feb920e1514f2a3791a3bae6b478fd16e7989a3fafea76636b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1e06d29f01ef5380c5da00d44c3b4ca19f1e17c0e6da89ccba577e951fc2e706
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4128cb268c1962feb920e1514f2a3791a3bae6b478fd16e7989a3fafea76636b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D316D31101225ABDF219FA8EC09FEE3BA8FF0D720F114211FA15E61A0C775D8A1DBA4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00813C5C
                                                                                                                                                                                                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00813C8A
                                                                                                                                                                                                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00813C94
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00813D2D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00813DB1
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00813ED5
                                                                                                                                                                                                                                                                                                                                                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00813F0E
                                                                                                                                                                                                                                                                                                                                                                                                    • CoGetObject.OLE32(?,00000000,0082FB98,?), ref: 00813F2D
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00813F40
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00813FC4
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00813FD8
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 429561992-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 541115aa48435784aa4853d0c681f16df4c966d0b95a910e028d850578efee17
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B3C12371608205AFD700DF68C88496AB7E9FF89748F00492DF98ADB251DB31EE46CB52
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00807AF3
                                                                                                                                                                                                                                                                                                                                                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00807B8F
                                                                                                                                                                                                                                                                                                                                                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 00807BA3
                                                                                                                                                                                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(0082FD08,00000000,00000001,00856E6C,?), ref: 00807BEF
                                                                                                                                                                                                                                                                                                                                                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00807C74
                                                                                                                                                                                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00807CCC
                                                                                                                                                                                                                                                                                                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00807D57
                                                                                                                                                                                                                                                                                                                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00807D7A
                                                                                                                                                                                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00807D81
                                                                                                                                                                                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00807DD6
                                                                                                                                                                                                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00807DDC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2762341140-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: db870a30de56befbeada059e6ce420d713565ead5b2e9d60b4650ae919716a6a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: fbb10deb4dfb5e4246c5a2144d5005d6e94ff6779856af4c5939ec012184fd21
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db870a30de56befbeada059e6ce420d713565ead5b2e9d60b4650ae919716a6a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09C13975A04109EFDB54DFA4C888DAEBBF9FF48314B1484A8E919DB261D730EE41CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00825504
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00825515
                                                                                                                                                                                                                                                                                                                                                                                                    • CharNextW.USER32(00000158), ref: 00825544
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00825585
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0082559B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008255AC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1350042424-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5e75e1a2c6de396cd158ffea071bc64cb6f0c8887c40947f6cfbbfb9226d3ed3
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3A617C70940628EBDF209F94EC84AFE7BB9FF09724F108149F925E6290D7748AC1DB61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007EFAAF
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 007EFB08
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 007EFB1A
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 007EFB3A
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 007EFB8D
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 007EFBA1
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 007EFBB6
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 007EFBC3
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBCC
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 007EFBDE
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBE9
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2706829360-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2721d3d119432ea16e04cb341c575aed42fa8a17a7b5d72834efee4078f06508
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61415075A01219EFCF10EF69DC589AEBBB9FF48354F00C065E905E7261D734A946CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 007F9CA1
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 007F9D22
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(000000A0), ref: 007F9D3D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 007F9D57
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(000000A1), ref: 007F9D6C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 007F9D84
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000011), ref: 007F9D96
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 007F9DAE
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(00000012), ref: 007F9DC0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 007F9DD8
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyState.USER32(0000005B), ref: 007F9DEA
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 541375521-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 78922f8a3367252372c8cc54dea07330373eb24b006fa21392ae9a61194609aa
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB41A634604BCD69FF71967488043B5BEA07F12344F14805ADBC6567C2EBAD99C8C7A2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 008105BC
                                                                                                                                                                                                                                                                                                                                                                                                    • inet_addr.WSOCK32(?), ref: 0081061C
                                                                                                                                                                                                                                                                                                                                                                                                    • gethostbyname.WSOCK32(?), ref: 00810628
                                                                                                                                                                                                                                                                                                                                                                                                    • IcmpCreateFile.IPHLPAPI ref: 00810636
                                                                                                                                                                                                                                                                                                                                                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008106C6
                                                                                                                                                                                                                                                                                                                                                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008106E5
                                                                                                                                                                                                                                                                                                                                                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 008107B9
                                                                                                                                                                                                                                                                                                                                                                                                    • WSACleanup.WSOCK32 ref: 008107BF
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Ping
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a65d8216c6b88645ed96edd44e53670fed6c0d208f84ddbcc9ab0c9494c3a364
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8abc471a38a3be8604506699b2237290abefd9527675d6d1393bc547f8cb0d48
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a65d8216c6b88645ed96edd44e53670fed6c0d208f84ddbcc9ab0c9494c3a364
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CF919A356042019FD720CF15D889F5ABBE4FF88318F0489A9E469DB6A2C7B5EC81CF81
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 707087890-567219261
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 711fd48231cc256dfce45499b00ab701545866ffdba484ddc118d29b2a6cf2a0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6cd65a74900288445db4e0cb3772bd824107d20056aaf63a13504e54bc13bd4a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 711fd48231cc256dfce45499b00ab701545866ffdba484ddc118d29b2a6cf2a0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28518F31A00116DBCF14DF68D9429FEB7AAFF65324B204229E926E72C4DB34DD84C790
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CoInitialize.OLE32 ref: 00813774
                                                                                                                                                                                                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 0081377F
                                                                                                                                                                                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,0082FB78,?), ref: 008137D9
                                                                                                                                                                                                                                                                                                                                                                                                    • IIDFromString.OLE32(?,?), ref: 0081384C
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 008138E4
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00813936
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c119614c6a9bcc543041f41f2e555e9f1116a78a199376e76aff44b660973c7c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39618C70608301AFD710DF54D888BAABBE8FF49714F104829F985DB291C774EE88CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008033CF
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008033F0
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3620dc438e0ebddb39e87246340c4e0dc29d701d89b16bfb406fffdf14ce18d8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9597cd344a7c57b94f554dc2a933413750e5efec0afe6fd1b48eb3e9f072476b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3620dc438e0ebddb39e87246340c4e0dc29d701d89b16bfb406fffdf14ce18d8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 93519C72800209EADF15EBA0DD4AEEEB778FF14340F144165F515B22A2EB792F58DB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2f48cf10c2362fca83cd80ada2b53440e388edeceb2fc0f45a10f05b8aaf9aae
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA41B632A0112ADBCB206F7DCC905BE77A5BFA4764B244229E621DB384F739DD85C790
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 008053A0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00805416
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00805420
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 008054A7
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: abba89c24541d36d4777ce9cc080c0f835ab63f12069e83ea6a96eea733e053a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6531D3B5A00908DFCB50DF68C889AEABBB4FF05305F548059E901CB2A2D731DD86CFA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateMenu.USER32 ref: 00823C79
                                                                                                                                                                                                                                                                                                                                                                                                    • SetMenu.USER32(?,00000000), ref: 00823C88
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823D10
                                                                                                                                                                                                                                                                                                                                                                                                    • IsMenu.USER32(?), ref: 00823D24
                                                                                                                                                                                                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 00823D2E
                                                                                                                                                                                                                                                                                                                                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823D5B
                                                                                                                                                                                                                                                                                                                                                                                                    • DrawMenuBar.USER32 ref: 00823D63
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0$F
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f46cce4179c02593c26075cc4e2c54491e81e37fc18c7aea29aa4522baf759ea
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61418874A01219EFDF24CF64E854AAABBB5FF49300F144028E946E7360D774EA11CF90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 007F1F64
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32 ref: 007F1F6F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32 ref: 007F1F8B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F1F8E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 007F1F97
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 007F1FAB
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F1FAE
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 438ff7a4d8f997bf717aee57ed2c71495ba71ce98090a5c42fe8a6737a387be4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1d8a40a03b60881c24ba9daf0983e6c5c8c9226d985f98702ff35ae86ef8103d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 438ff7a4d8f997bf717aee57ed2c71495ba71ce98090a5c42fe8a6737a387be4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B221AF70900218EBDF14EFA5DC99DFEBBA8EB15310F404159BA61A72A1DB385909DB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 007F2043
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32 ref: 007F204E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32 ref: 007F206A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F206D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 007F2076
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 007F208A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F208D
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3194740e7d9f03caa6e073e5432f0be61d5c9b6cdd25b83a541e0da04f4f2c50
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 94c96f1ed98b16802cab59bc8cf6d8079df017a112fa709730c16345ba6d43be
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3194740e7d9f03caa6e073e5432f0be61d5c9b6cdd25b83a541e0da04f4f2c50
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A221D471900218BBDF10AFA4DC49EFEBBB8FF15340F104409BA61A72A1DB794919DB70
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00823A9D
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00823AA0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00823AC7
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00823AEA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00823B62
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00823BAC
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00823BC7
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00823BE2
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00823BF6
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00823C13
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 312131281-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 31d72e4892d9737bd7c13783d3a73ad11d6c49e45c2995278cbaa2abb2e4d40e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 15618975900218AFDB10DFA8DC95EEE77B8FB09710F14009AFA15E72A2C774AE81DB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 007FB151
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB165
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 007FB16C
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB17B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 007FB18D
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1A6
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1B8
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1FD
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB212
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB21D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2156557900-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f34301f0a5ca896d6c7366f90e0286e6c3c0c729c6bff50163978e0c58490073
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 14318DB5500608BFEB209F64DC48BBD7BA9FBA1321F119019FB05D6290D7B89E458F61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2C94
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CA0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CAB
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CB6
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CC1
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CCC
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CD7
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CE2
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CED
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2CFB
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ae70cf53277b433889f567f6eccfe88be024aa02f433928240695eb3e2723d7d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D3118076100108EFCB02EF94D886E9D3BA5BF05350F5144A9FA48AB232DA35EA519F90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00807FAD
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00807FC1
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00807FEB
                                                                                                                                                                                                                                                                                                                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00808005
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00808017
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00808060
                                                                                                                                                                                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008080B0
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 769691225-438819550
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 09fe5a47267959c940d3cb2d5891066b4bd75dc262b4722877c13b19ab9848b2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 163faf5c8efbe01031da2b9d447e1ebd556a2d4a64ea088c7e68eaea6f11d3ac
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 09fe5a47267959c940d3cb2d5891066b4bd75dc262b4722877c13b19ab9848b2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E9819072908245DBCB60EF14C8449AEB3E9FF89714F54886EF885C7290EB35ED45CB52
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 00795C7A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00795D0A: GetClientRect.USER32(?,?), ref: 00795D30
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00795D0A: GetWindowRect.USER32(?,?), ref: 00795D71
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00795D0A: ScreenToClient.USER32(?,?), ref: 00795D99
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32 ref: 007D46F5
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007D4708
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 007D4716
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 007D472B
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 007D4733
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007D47C4
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: U
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9782fcd2aab76b3284bbec311cf1d32c9bb9e01680b950fd311b007a561a4e00
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7771D131500205DFCF228F64D984ABA7BB6FF4A360F18426AED565A3A6C739DC41DF60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008035E4
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00862390,?,00000FFF,?), ref: 0080360A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 02967f8cb2d06e7900f5a8bdb1fa293d3c6681ff0b532f788f5c1d41850422d5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 71efcacea93009122cded72c76f2d267a390dc6e88f1d3c0e6e9d8c81664da85
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 02967f8cb2d06e7900f5a8bdb1fa293d3c6681ff0b532f788f5c1d41850422d5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF515171800109FADF15EBA0DC4AEEDBB78FF14340F144129F615B22A1EB791B99DBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: GetCursorPos.USER32(?), ref: 007A9141
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00828B6B
                                                                                                                                                                                                                                                                                                                                                                                                    • ImageList_EndDrag.COMCTL32 ref: 00828B71
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseCapture.USER32 ref: 00828B77
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00828C12
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00828C25
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00828CFF
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1924731296-2107944366
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4aa01035a816b0d7841462f06be66da9463c6e73759666c73b1fe8f37495870f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ed744d5fa5af16582984ac58621868e9bd90a74cd314d00fd24fbcf49009f3e2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4aa01035a816b0d7841462f06be66da9463c6e73759666c73b1fe8f37495870f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB519C71105314AFEB10DF24EC5AFAA77E4FB88714F40062DFA56972E2CB749944CB62
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                                                                                                                                                                                                                                                                                                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C29A
                                                                                                                                                                                                                                                                                                                                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C2CA
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0080C322
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?), ref: 0080C336
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 341a6e76168e87c015857d13addd3f22aa597ed73cc4611f53eee802d1665067
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 393149B1600608AFD7719FA98C89ABB7AFCFB49744F14861EF446D2280DB34DD059BA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007D3AAF,?,?,Bad directive syntax error,0082CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007F98BC
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,?,007D3AAF,?), ref: 007F98C3
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007F9987
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 78299dc4df60209f2da1503fc1260ef3373f9d524708282da2661724d3c034e8
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F8216F3184021DEBDF11AF90DC0AEFE7779FF14301F044459F615621A1EA79A628DB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32 ref: 007F20AB
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 007F20C0
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007F214D
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 99ae6d631c0a8d8130bf7fc1e47456e69b79a7c63604d635b646f2edd95c55d2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3511277628870EF9FA1122209C1BDFA739CEB15325B204116FB04E42D3FB6DA80B5619
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1282221369-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fef6a1912a7710a76027c812467c61ac67e224e84cd468cd90e34e8935af9b50
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 266c582803aee034355baa6673a9c45b1070f8b47a03223ab81298e88d6b3f4d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fef6a1912a7710a76027c812467c61ac67e224e84cd468cd90e34e8935af9b50
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A2613772904300AFDB32AFB49889F6E7BA5AF05320F05426DF948EB282D77D9D419B50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 007E6890
                                                                                                                                                                                                                                                                                                                                                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007E68A9
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007E68B9
                                                                                                                                                                                                                                                                                                                                                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007E68D1
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007E68F2
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E6901
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007E691E
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E692D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1268354404-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 16b69450878d25d38401803ad697587a28fc53753c62a18df9a2ee40c218bc7e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39519BB0600209EFDB20DF25CC55FAA7BB5FF99350F144628F912972A0DB78E991DB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C182
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0080C195
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?), ref: 0080C1A9
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0080C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0080C253: GetLastError.KERNEL32 ref: 0080C322
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0080C253: SetEvent.KERNEL32(?), ref: 0080C336
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0080C253: InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 337547030-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ebfd3c5318661e6732b9dafc32c1dc5594ca3e62f75a853880169b401c746b2f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 36318C71600605EFDB619FA9DD44A7ABBF8FF18300B00862DF956C2A50DB30E815ABA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25BD
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007F25DB
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007F25DF
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25E9
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007F2601
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 007F2605
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F260F
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007F2623
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 007F2627
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2014098862-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f7151d5acb5518bbdcce7d7355b956f3f5734868186b24684cea78f87c12d92d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3D01D430390614BBFB2067699C8EF693F59EF5EB12F104005F328AF1D1C9E624569A69
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,007F1449,?,?,00000000), ref: 007F180C
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1813
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1828
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,007F1449,?,?,00000000), ref: 007F1830
                                                                                                                                                                                                                                                                                                                                                                                                    • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1833
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1843
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(007F1449,00000000,?,007F1449,?,?,00000000), ref: 007F184B
                                                                                                                                                                                                                                                                                                                                                                                                    • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F184E
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,007F1874,00000000,00000000,00000000), ref: 007F1868
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1957940570-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d4ab47c54f488b40fab98aca3d919ea45f5035fe5ecd010d15a8f49f791ca61c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3D01BFB5640308BFE720AB65DC4EF6B7B6CFB89B11F508411FA05DB291C6749815CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: }}{$}}{$}}{
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1036877536-3362948059
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 382d1c7672091965978773cb88a9e076100139ac1b8e1d6416fcc4954cc8279b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CFA14772E003869FDB21CF18C8A1FAEBBF5EF65350F1845ADE5859B282C23C8981C750
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FD4DC: CloseHandle.KERNELBASE(00000000), ref: 007FD5DC
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A16D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0081A180
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A1B3
                                                                                                                                                                                                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0081A268
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000), ref: 0081A273
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0081A2C4
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ca0c099a9d90d0607e216d7dc3ee1667ef7fc71d9188cee548362cf6268cc430
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: fdcdf18c1bf07b151a143ab81d14be52c000c8b18f43745de059449e82d138d3
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ca0c099a9d90d0607e216d7dc3ee1667ef7fc71d9188cee548362cf6268cc430
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AD619C31205242AFD724DF14C498F69BBA5FF44318F58848CE46A8B7A2C776EC85CB82
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00823925
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0082393A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00823954
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00823999
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 008239C6
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008239F4
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SysListView32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 23bb535010783b24bc0a04d1c81f8dbc7abbe18cb3ae4f21722c9fc431446de9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B41A371A00229ABEF219F64DC49FEE7BA9FF08350F100526F958E7281D7759AC4CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FBCFD
                                                                                                                                                                                                                                                                                                                                                                                                    • IsMenu.USER32(00000000), ref: 007FBD1D
                                                                                                                                                                                                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 007FBD53
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemCount.USER32(01215370), ref: 007FBDA4
                                                                                                                                                                                                                                                                                                                                                                                                    • InsertMenuItemW.USER32(01215370,?,00000001,00000030), ref: 007FBDCC
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0$2
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 4048bd5710bc4f97e7db7ce92cc6fae5edfcfcfc1d61ea13159e03c686775cb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50519E70B0020DDBDB24DFA8D988BBEBBF4BF45314F148159E61197391D778A941CB62
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 007B2D4B
                                                                                                                                                                                                                                                                                                                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 007B2D53
                                                                                                                                                                                                                                                                                                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 007B2DE1
                                                                                                                                                                                                                                                                                                                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 007B2E0C
                                                                                                                                                                                                                                                                                                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 007B2E61
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: &H{$csm
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1170836740-2200307801
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 10ee86cc80fe3a6c91d5c4c75b8784c8484793eb6b2baed0c005912a8164e85c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 83418034A01209EBCF10DF68C849BDEBBB5FF44364F148155E814AB393D739AA46CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 007FC913
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: IconLoad
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0808bdb201ecc9c2968723ccf2a05b8cf653d43e08f15178d07b20ac7dc1f569
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5112B3168930EBEEB02DB54DD82DFE679CDF15365B50402AFA00E7382E7ADAE045264
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0.0.0.0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 118a13e178be4b9faa8cd1310c390f6e54856830074471432304ffe146c10fd7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7909ba87be17401f673832e7e25d287a91fa14149006453f36c95f47ea416e6a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 118a13e178be4b9faa8cd1310c390f6e54856830074471432304ffe146c10fd7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B6110371904118EFCB30BB649C0EEFE77ADEF11711F0101B9F645AA291EF799E818A61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00829FC7
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00829FE7
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0082A224
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0082A242
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0082A263
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000003,00000000), ref: 0082A282
                                                                                                                                                                                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0082A2A7
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 0082A2CA
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1211466189-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5fae32357a2893c4f5bd73461a4d1c644e6e9b5f9ed300478f380ca1be4fba73
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6ccff2a151c6a42b3cbb6b79b3c1156d3d37e2603539f304167d10db8d2a50bd
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5fae32357a2893c4f5bd73461a4d1c644e6e9b5f9ed300478f380ca1be4fba73
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 02B18931600229DFDF18CF68D9857AE7BB2FF44711F098069EC49DB295D731A990CB61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 952045576-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f7890f16ccd1d9ccb1d71fd94305063ef367c7cb508c6a143653569089bb1668
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3A419666C10118B6DB11EBF48C8EADF77A8BF45710F508462E614E3222FB3CE655C3A6
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007AF953
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF3D1
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF454
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ShowWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1268545403-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 79fabeb420d3ab25be2e172200e209e9d1d5923addbccca41299d934c428077e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A4118302056C0BEC7759B6D888877B7B91BBDB310F14863DE047D2961C63DB880CB52
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00822D1B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00822D23
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00822D2E
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00822D3A
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00822D76
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00822D87
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00825A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00822DC2
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00822DE1
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3864802216-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e5fd1b6ad4c927401ddb825d7c2f80c6674c2833901521195b80af444e0c420c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 94318972201624BFEB218F549C8AFFB3BA9FF09711F048055FE08DA291C6759C91CBA4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _memcmp
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 51e36369dc2713af9fb3685b3a065b9f307f28a7522798059d1b095b2d5a1340
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0E218361644A2DB7D6146620DD96FFA23ACAF20794B840030FF25DB782F72CED10C6A5
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-572801152
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: aa9dac0222d06ce49a04be723acc9501c3c56f3489463c39043a9e32555d99a3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7d70ecfbfb8ff03bc739c056bbcadbb10e58ae468660f78b73dbf1d8b0d7b4d3
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa9dac0222d06ce49a04be723acc9501c3c56f3489463c39043a9e32555d99a3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C2D17D71A0060AEFDB10CF98D881BEEB7B9FF88344F148569E915EB281D7709985CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 007D15CE
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D1651
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,007D17FB,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D16E4
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D16FB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D1777
                                                                                                                                                                                                                                                                                                                                                                                                    • __freea.LIBCMT ref: 007D17A2
                                                                                                                                                                                                                                                                                                                                                                                                    • __freea.LIBCMT ref: 007D17AE
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2829977744-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4f11efc3a6210d5c9e0974393d4507f77bc912e4bf5c2a7335906ec9be9a15f2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2dccec73f3ce1f8873bcbd4af898703067f4846658a0f852493238a4b69bbe76
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4f11efc3a6210d5c9e0974393d4507f77bc912e4bf5c2a7335906ec9be9a15f2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2B91C471E00216BADB208E74DD85EEE7BB5AF49310F98466AE806E7351DB3DDD40CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ae38c75c558dd575d8efab919505609461b3bdd6c1699ae526c7501c42a6a3cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 56beea37f6ae5cc035f9330a7d19d8d0b45a6e5f4e6412a1703bbfebc4ff6430
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ae38c75c558dd575d8efab919505609461b3bdd6c1699ae526c7501c42a6a3cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C916B71A00219ABDF20CFA4D888FEEBBB8FF46715F108559F515EB281D7709985CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0080125C
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00801284
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008012A8
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008012D8
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0080135F
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008013C4
                                                                                                                                                                                                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00801430
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2550207440-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: db8606b86ef554a769281e293c475b582d351fba0cb9a843b06e18396a55793f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CD91BE71A002099FEF50DFA8C889BBEB7B5FF45325F114029E901EB2A1D778A941CB95
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2d7cfe500ab3b1cf07ba2ef0be7d2629edc294f9ec5cc73aa90d8b7d2a46ff33
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 63915C71D00219EFCB14CFA9CC89AEEBBB9FF89320F148155E515B7291D378A952CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 0081396B
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00813A7A
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00813A8A
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00813C1F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00800CDF: VariantInit.OLEAUT32(00000000), ref: 00800D1F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00800CDF: VariantCopy.OLEAUT32(?,?), ref: 00800D28
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00800CDF: VariantClear.OLEAUT32(?), ref: 00800D34
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 401a5adb51fdd2c4a1149b1ed8ea353244a065a172040d69715a4dccf6d70a46
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 359125746083059FCB14DF28C4849AAB7E8FF89314F14892DF98A97351DB35EE45CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                                                                                                                                                                                                                                                                                                                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00814C51
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00814D59
                                                                                                                                                                                                                                                                                                                                                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00814DCF
                                                                                                                                                                                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00814DDA
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: bf13abf699e8d5f7aa8a147327053cc0a8887750b69baf08cdba86453b22206e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: de94dbc14a94ef1d39909dad09c0addc42f84f0a11bbd990458313b58157ce1b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bf13abf699e8d5f7aa8a147327053cc0a8887750b69baf08cdba86453b22206e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AD910371D0021DEBDF10DFA4D895AEEB7B9FF08314F10816AE915A7251EB349A85CFA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenu.USER32(?), ref: 00822183
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemCount.USER32(00000000), ref: 008221B5
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008221DD
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00822213
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,?), ref: 0082224D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSubMenu.USER32(?,?), ref: 0082225B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008222E3
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4196846111-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f1a528188d691789344d2073c7485c18a69abe9b8dbedf77b472f5ee01a4b47d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d356f280fb81a098947be9491bf37d915e09b258b4bcda82b717fe4f0ec7fef9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f1a528188d691789344d2073c7485c18a69abe9b8dbedf77b472f5ee01a4b47d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 13719075A00225EFCB14EFA4D845AAEB7F1FF48310F148459E916EB351DB39ED818B90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindow.USER32(01215348), ref: 00827F37
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindowEnabled.USER32(01215348), ref: 00827F43
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0082801E
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(01215348,000000B0,?,?), ref: 00828051
                                                                                                                                                                                                                                                                                                                                                                                                    • IsDlgButtonChecked.USER32(?,?), ref: 00828089
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(01215348,000000EC), ref: 008280AB
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008280C3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4072528602-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 42f664d22777b6721c71c8edd20c8d8596e6792a833570a9187f2b873b257c0c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B771BC7460D224EFEF219F65E984FBABBB9FF19300F144059E945D72A1CB31A885CB21
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 007FAEF9
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 007FAF0E
                                                                                                                                                                                                                                                                                                                                                                                                    • SetKeyboardState.USER32(?), ref: 007FAF6F
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 007FAF9D
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 007FAFBC
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 007FAFFD
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007FB020
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 87235514-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a2b10dd5fd5f0a415b313de8a362f2f983dac8ee6b909827b7a05adab7fbcb51
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6A51B3E06047D93DFB364234CC49BBA7EE96B06304F088589E2D9599C2D79CECC8D762
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetParent.USER32(00000000), ref: 007FAD19
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 007FAD2E
                                                                                                                                                                                                                                                                                                                                                                                                    • SetKeyboardState.USER32(?), ref: 007FAD8F
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007FADBB
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007FADD8
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007FAE17
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007FAE38
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 87235514-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 22896e2e06a5dae8e08dd6ca832b2710f53663930ce614f450da24a1edf1005b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4D51C6E16447D93DFB368334CC56B7A7EA96B45300F088589E2DD46AC2D29CEC88D752
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetConsoleCP.KERNEL32(007D3CD6,?,?,?,?,?,?,?,?,007C5BA3,?,?,007D3CD6,?,?), ref: 007C5470
                                                                                                                                                                                                                                                                                                                                                                                                    • __fassign.LIBCMT ref: 007C54EB
                                                                                                                                                                                                                                                                                                                                                                                                    • __fassign.LIBCMT ref: 007C5506
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007D3CD6,00000005,00000000,00000000), ref: 007C552C
                                                                                                                                                                                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,007D3CD6,00000000,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C554B
                                                                                                                                                                                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,00000001,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C5584
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1324828854-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ce7abcf679380bb1ff7c4e7beb2ea50ba0f699977127a0bd926a9c9f71553c88
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7751B570A006499FDB10CFA8E845FEEBBF5FF08300F14451EE555E7291E675AA91CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0081307A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                                                                                                                                                                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00811112
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00811121
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 008111C9
                                                                                                                                                                                                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 008111F9
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2675159561-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0d4c5c413c992dcdd211c954c4d8c661951a047ea8d36d8c011ba90dbfc04c96
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8141C232600604AFDF209F14D888BE9B7EAFF45324F148059FA19DB291D774AD81CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 007FCF45
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 007FCF7F
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FD005
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FD01B
                                                                                                                                                                                                                                                                                                                                                                                                    • SHFileOperationW.SHELL32(?), ref: 007FD061
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: cbcb0eea186e80ee8bd963fcb5bc5fc14f27bc56d4cc9f9690cf816a44f72bf1
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB41587290511D9FDF22EBA4DA85AEDB7F9AF08340F0000E6E605E7251EB38AB44CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00822E1C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00822E4F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00822E84
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00822EB6
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00822EE0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00822EF1
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00822F0B
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2178440468-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 11ff562016e52dde70bf6d1b60ba1203b6df3f2d57be1641bd4b4364726e8fd1
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A131F438604164AFDB21CF58EC89F6937E1FB5A710F5A5164F911CB2B2CBB1A881AB41
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7769
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F778F
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 007F7792
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(?), ref: 007F77B0
                                                                                                                                                                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 007F77B9
                                                                                                                                                                                                                                                                                                                                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 007F77DE
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(?), ref: 007F77EC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ebd2c68fc079071e5a527e60ad80ca5237ead941e68f4e4a151483c6c82eae43
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 717aa6b4758dc47816e0bde3a5014d967cbd5b21ad849fc440dc92bac19d6467
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ebd2c68fc079071e5a527e60ad80ca5237ead941e68f4e4a151483c6c82eae43
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0C219F76608219AFDB14AFA8CC88CBB73ACEB093647108125FA14DB250D6749C42CBB4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7842
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7868
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 007F786B
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32 ref: 007F788C
                                                                                                                                                                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32 ref: 007F7895
                                                                                                                                                                                                                                                                                                                                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 007F78AF
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(?), ref: 007F78BD
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2bd936da556d9dccbaeed7d301235316b195f8c1d8c2ef652fbff9fae20c7bb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f4ef0beedc89d0381ac28df7526c0f2ea4c72f03180dfc70cb26f7eef92e0a8c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2bd936da556d9dccbaeed7d301235316b195f8c1d8c2ef652fbff9fae20c7bb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64214435608208AFDB24AFA8DC8DDBB77ECFB097A07108125FA15CB2A5D674DC41CB64
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 008004F2
                                                                                                                                                                                                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0080052E
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: nul
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 822da73937458c85b1a993f184173eaa727ad39ed4b29553c4ca976d01b0e553
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 88215A75600305ABDB609F69DC45BAA7BB4FF45724F204A29E8A1E62E0E7709951CF20
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                                                                                                                                                                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00800601
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: nul
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 609f71f3d9ca4815badfc1e51034c45aa62a51e1eaa7bfd31731744afa6a7794
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E921A1756003059BDB608F68DC04BAA77E5FFA5724F204A19F8B1E72E0DB719961CF10
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00824112
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0082411F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0082412A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00824139
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00824145
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Msctls_Progress32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 4abee027fd11f3781687de7256c1a8bc2cd809db517b11a7d03992e9491aa70f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 041181B1140229BEEF119F64DC85EE77F5DFF08798F015111BA18E2190C6769C619BA4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007CD7A3: _free.LIBCMT ref: 007CD7CC
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD82D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD838
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD843
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD897
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD8A2
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD8AD
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD8B8
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 27ade6682f56a3dd946bb67917d9acd128a599c5e94e803a55c9147544ec4270
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B911EF71541B04EAD531BFB0CC4BFCB7BDCAF05700F40582DB29DA69A3DA79B9064A50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007FDA74
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000000), ref: 007FDA7B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007FDA91
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadStringW.USER32(00000000), ref: 007FDA98
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007FDADC
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 007FDAB9
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 09145f1666e4ff52fabc4d5f787d1c9c41a17af18675665631494d8b41eafa5b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8B0186F25002087FE7209BE49D89EFB376CFB08301F408496B706E2141E6749E854F74
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(0120EB60,0120EB60), ref: 0080097B
                                                                                                                                                                                                                                                                                                                                                                                                    • EnterCriticalSection.KERNEL32(0120EB40,00000000), ref: 0080098D
                                                                                                                                                                                                                                                                                                                                                                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0080099B
                                                                                                                                                                                                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(?,000003E8), ref: 008009A9
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 008009B8
                                                                                                                                                                                                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(0120EB60,000001F6), ref: 008009C8
                                                                                                                                                                                                                                                                                                                                                                                                    • LeaveCriticalSection.KERNEL32(0120EB40), ref: 008009CF
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3495660284-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 948e5d440d442a21f8ec465ba67b54c7473afdbcfa36dc50159296c50eb9ac91
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 58F0F431442912FBD7615F94EE8DBEABB35FF05702F505015F101908A5CB759476CF90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00811DC0
                                                                                                                                                                                                                                                                                                                                                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00811DE1
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00811DF2
                                                                                                                                                                                                                                                                                                                                                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 00811EDB
                                                                                                                                                                                                                                                                                                                                                                                                    • inet_ntoa.WSOCK32(?), ref: 00811E8C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F39E8: _strlen.LIBCMT ref: 007F39F2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00813224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0080EC0C), ref: 00813240
                                                                                                                                                                                                                                                                                                                                                                                                    • _strlen.LIBCMT ref: 00811F35
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3203458085-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c57c5882e81e1ca4f31e7210041e5f33e09c5c7417fde25d08de4de244087765
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c3a0dc51d1a2fb0a75caec4f2480cd1f635d6e63e8576c344e609e8977a82d06
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c57c5882e81e1ca4f31e7210041e5f33e09c5c7417fde25d08de4de244087765
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7BB1D231204340EFCB24DF24D889E6A7BA9FF85318F54854CF5569B2A2DB31ED82CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00795D30
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00795D71
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00795D99
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00795ED7
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00795EF8
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1296646539-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6bca5b95474fbc1ff7e2b3f0d328da4fd5e090b43607974ec2882f59e2d838c6
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 73B16734A00A4ADBDF10CFA9D4807EEB7F1FF58310F14851AE8AAD7250DB38AA51DB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • __allrem.LIBCMT ref: 007C00BA
                                                                                                                                                                                                                                                                                                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C00D6
                                                                                                                                                                                                                                                                                                                                                                                                    • __allrem.LIBCMT ref: 007C00ED
                                                                                                                                                                                                                                                                                                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C010B
                                                                                                                                                                                                                                                                                                                                                                                                    • __allrem.LIBCMT ref: 007C0122
                                                                                                                                                                                                                                                                                                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C0140
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1992179935-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f7c80e27aa41f24a0e7fb6099b29083bb8eeb1f2f7780539d4561e17fa67407c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3E81D376A00B06EFE7209E68CC46FAEB3A9EF41724F24453EF551D6681E778D94087D0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007B82D9,007B82D9,?,?,?,007C644F,00000001,00000001,8BE85006), ref: 007C6258
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007C644F,00000001,00000001,8BE85006,?,?,?), ref: 007C62DE
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007C63D8
                                                                                                                                                                                                                                                                                                                                                                                                    • __freea.LIBCMT ref: 007C63E5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                                                                                                                                                                                                                                                                                                                                                                    • __freea.LIBCMT ref: 007C63EE
                                                                                                                                                                                                                                                                                                                                                                                                    • __freea.LIBCMT ref: 007C6413
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1414292761-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 905ec66407580246d075325a7309d948461504a597cba5a7d8ec9093e93eb461
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 36c582b1397ec5e416a60e28841bd34e05ca23488ae42d4d386c1930daae47bb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 905ec66407580246d075325a7309d948461504a597cba5a7d8ec9093e93eb461
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1751CC72A00256ABEB258F64CCC5FBF7BAAEB44750B14862DF805D6181EB38DC40C6A0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BCCA
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BD25
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0081BD6A
                                                                                                                                                                                                                                                                                                                                                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0081BD99
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081BDF3
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0081BDFF
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1120388591-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fb6b1837b63a9cf530a0605c9cdce757018a7fccd6d857e08279cbd9d5ad2555
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f22d1c24d7a5998597cad8f7ab93027052da75e86a446705ba7a347843805144
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fb6b1837b63a9cf530a0605c9cdce757018a7fccd6d857e08279cbd9d5ad2555
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8F819E30208241EFD714DF24D895E6ABBE9FF84308F14895CF5598B2A2DB31ED85CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(00000035), ref: 007EF7B9
                                                                                                                                                                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(00000001), ref: 007EF860
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF889
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(007EFA64), ref: 007EF8AD
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF8B1
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 007EF8BB
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3859894641-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9f0722f24a6f0537b3afe591ab64159996445ba0914a31f9a249e79ad18e123b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7B51E831602350FADF20AF66D899B39B3A8EF49310F209467F945DF692DB789C40C796
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 008094E5
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00809506
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0080952D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00809585
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: X
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7c99f6aaeba055847caa0a3f5d4870fe99815625fc90b3bcbc23cefbdd913f52
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 62416353552688f865836c3bf7184dc6559d7ad5f0a27e4c6ded16da92cb4381
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c99f6aaeba055847caa0a3f5d4870fe99815625fc90b3bcbc23cefbdd913f52
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0FE1BD71608300DFDB64DF24D885A6AB7E0FF85314F05896DF8999B2A2DB34ED05CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • BeginPaint.USER32(?,?,?), ref: 007A9241
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 007A92A5
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 007A92C2
                                                                                                                                                                                                                                                                                                                                                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007A92D3
                                                                                                                                                                                                                                                                                                                                                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 007A9321
                                                                                                                                                                                                                                                                                                                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007E71EA
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9339: BeginPath.GDI32(00000000), ref: 007A9357
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3050599898-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9206f036e184a040ea729af9ad1efd2c666e13c1d79ccd2b66a20cc053485299
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD418C70105300AFDB21DF25C889FBA7BB8FB9A720F140229FA54872A2C7759855DB62
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0080080C
                                                                                                                                                                                                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00800847
                                                                                                                                                                                                                                                                                                                                                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00800863
                                                                                                                                                                                                                                                                                                                                                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 008008DC
                                                                                                                                                                                                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008008F3
                                                                                                                                                                                                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00800921
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3368777196-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4ae9c77aa00c7e975e01ab882fe360f1a86d86d8e90a95aaf579034830eade12
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d6e62b334b9d976c001c08afea0602495b606c8d6fa55969442e5b4a8e2c9cb8
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4ae9c77aa00c7e975e01ab882fe360f1a86d86d8e90a95aaf579034830eade12
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F0414A71900205EFDF14AF94DC85AAA77B9FF44310F1480A9ED00DA29BDB34EE65DBA4
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,007EF3AB,00000000,?,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 0082824C
                                                                                                                                                                                                                                                                                                                                                                                                    • EnableWindow.USER32(?,00000000), ref: 00828272
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008282D1
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(?,00000004), ref: 008282E5
                                                                                                                                                                                                                                                                                                                                                                                                    • EnableWindow.USER32(?,00000001), ref: 0082830B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0082832F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 642888154-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5e87c4c5b7a2f2d3e3f927d16af45bc2dd0d1ba523eccbf44561ca9840c2387f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8141A534602654EFDF21CF25E899BE47BE1FB0A714F195169E5088B263CB71A881CF51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindowVisible.USER32(?), ref: 007F4C95
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007F4CB2
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007F4CEA
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007F4D08
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007F4D10
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 007F4D1A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 72514467-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e5957b0f23cf7b49d8909933fcc7bcc056419bdc6e7fe6815421c20fbcf16ae4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 3b5e4344d26cb50c8de2b5c41bf2be4e7d795d6705db9e2ef8c8695b0dc6aaa0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e5957b0f23cf7b49d8909933fcc7bcc056419bdc6e7fe6815421c20fbcf16ae4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E3210832304204BBEB255B79EC49E7F7BACEF55750F10807DFA05CA292EA69DC01D6A0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0080587B
                                                                                                                                                                                                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00805995
                                                                                                                                                                                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 008059AE
                                                                                                                                                                                                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 008059CC
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: .lnk
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d8c94a308d0f577ea62069f41d923ab38c10b441aa4613d1ebe5261e5fb4e69d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5FD14271608601DFCB54DF24D89492BBBE1FF89720F148859F8899B2A1D731EC45CFA2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?,00000000,007F1335), ref: 007F17AE
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007F17BA
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 007F17C1
                                                                                                                                                                                                                                                                                                                                                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 007F17DA
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,007F1335), ref: 007F17EE
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F17F5
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3008561057-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8aad5e6931d8de8cb6622977d174dd639fbf8b8e122263b36a03146e21c0a4d0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 37117C71900609FFDB20AFA4CC4ABBF7BA9FB45355F508018F54597211D739A945CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007F14FF
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 007F1506
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007F1515
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000004), ref: 007F1520
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007F154F
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 007F1563
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1413079979-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: dcf09848c863467e847a9db1c5f9c496aa09c70c1832674632c39cc52e33175a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4E11177250024DEBDB218F98DD49BEE7BA9FF48744F148015FA05A2160C3758E619B61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,007B3379,007B2FE5), ref: 007B3390
                                                                                                                                                                                                                                                                                                                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007B339E
                                                                                                                                                                                                                                                                                                                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007B33B7
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,?,007B3379,007B2FE5), ref: 007B3409
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3852720340-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2a5c011d8b2d8828104a819e5a4c0ed6f5dab6ccfb7765f62f611891fa00a673
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ebbe57718831fa59c83506738c37a5dba9b41ba6360102f8671de15cac94a954
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2a5c011d8b2d8828104a819e5a4c0ed6f5dab6ccfb7765f62f611891fa00a673
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2201F733609711FEAA252774BC8ABEB2B94FB1537A720022DF411862F1EF1D5D829954
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,007C5686,007D3CD6,?,00000000,?,007C5B6A,?,?,?,?,?,007BE6D1,?,00858A48), ref: 007C2D78
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2DAB
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2DD3
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DE0
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DEC
                                                                                                                                                                                                                                                                                                                                                                                                    • _abort.LIBCMT ref: 007C2DF2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3160817290-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 834fbc7a0a5b9cab2c75d07ae2c498697ed8ae2971b5659e1cb13f5ba465d51e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 854555a5092e44083351888d56c691b0aa3e0f5c2020e938a2801eabe64e854e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 834fbc7a0a5b9cab2c75d07ae2c498697ed8ae2971b5659e1cb13f5ba465d51e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D9F0A431644B00BBC6226734AC0EF2E2759BBD17A1F25451CF825922E3EE2C98034561
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00828A4E
                                                                                                                                                                                                                                                                                                                                                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 00828A62
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00828A70
                                                                                                                                                                                                                                                                                                                                                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 00828A80
                                                                                                                                                                                                                                                                                                                                                                                                    • EndPath.GDI32(?), ref: 00828A90
                                                                                                                                                                                                                                                                                                                                                                                                    • StrokePath.GDI32(?), ref: 00828AA0
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 43455801-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d41d2083640043d4d9aa5d0cc4e95e995a38ae5b969e817e71e9ebab432e4439
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AE11C976000519FFEF129F94DC88EAA7F6DFB08354F44C012FA199A1A1C771AD55DBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 007F5218
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 007F5229
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F5230
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 007F5238
                                                                                                                                                                                                                                                                                                                                                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007F524F
                                                                                                                                                                                                                                                                                                                                                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 007F5261
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CapsDevice$Release
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1035833867-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f086e889e3d86e37d1d6a52006c0ef72f4e2d239d347e1ee8298b047764a00ab
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26014FB5E01718BBEB109BA69C49A6EBFB8FF48751F048165FB04A7281D6709801CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                                                                                                                                                                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Virtual
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4278518827-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1be778de117508baab5263b2d71e0f1d45c75d83651f19cba12828fa171b14a2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 740167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007FEB30
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007FEB46
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 007FEB55
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB64
                                                                                                                                                                                                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB6E
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB75
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 839392675-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2b84a6624a29fd2e369ced00f521b322dcd558f5c16a44f6c0b0f12fb16de68c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 11F03AB2240558BBE7315B629C0EEFF7A7CFFCAB11F008159FA01D1191D7A45A02C6B5
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(?), ref: 007E7452
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 007E7469
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowDC.USER32(?), ref: 007E7475
                                                                                                                                                                                                                                                                                                                                                                                                    • GetPixel.GDI32(00000000,?,?), ref: 007E7484
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 007E7496
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000005), ref: 007E74B0
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 272304278-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 64c526c1ffa642007d3a2df90df70fc590a1c1114771be94e34c57855bd2c398
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0C018631400245EFEB615FA4DC08BBE7BB5FF08321F218164FA16A21A1CB351E52EB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007F187F
                                                                                                                                                                                                                                                                                                                                                                                                    • UnloadUserProfile.USERENV(?,?), ref: 007F188B
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 007F1894
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 007F189C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 007F18A5
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F18AC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 146765662-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e405e0b0166289b14c9f1667ccca5de223b1688c86fb83042dfa426111eb5d58
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0CE0C236004501BBDA115BA5ED0D92ABB29FF49B22B20C620F22581174CB329432DB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B0242: EnterCriticalSection.KERNEL32(0086070C,00861884,?,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B024D
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B0242: LeaveCriticalSection.KERNEL32(0086070C,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B028A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                                                                                                                                                                                                                                                                                                                                                                    • __Init_thread_footer.LIBCMT ref: 00817BFB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B01F8: EnterCriticalSection.KERNEL32(0086070C,?,?,007A8747,00862514), ref: 007B0202
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B01F8: LeaveCriticalSection.KERNEL32(0086070C,?,007A8747,00862514), ref: 007B0235
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: +T~$5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 535116098-1127575951
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d0c208d4234bd1e10384128b1152536eaad99ecec964ed07570386c3916411fc
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 34349c538a3417a56446477b92af55ba1d29f83ef580f5cec416a090746d2335
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d0c208d4234bd1e10384128b1152536eaad99ecec964ed07570386c3916411fc
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3916B74A04209EFCB14EF98E8959EDB7B9FF49304F10805DF8069B291DB71AE85CB51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC6EE
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FC735
                                                                                                                                                                                                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC79C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007FC7CA
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 345235b09e1840411bb5ee0803591b929583d201a1e3b9cd942746ee69037381
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 50506a40b95b7df4cb851818b8b67cf1cbacf5c1f22a33f76dde02e9e4c0d7da
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 345235b09e1840411bb5ee0803591b929583d201a1e3b9cd942746ee69037381
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D351D47160830C9BD716AF28CA49B7B77E8AF85314F040A29F695D3391DB78D904DB62
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 0081AEA3
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessId.KERNEL32(00000000), ref: 0081AF38
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0081AF67
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: <$@
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e1a7d63f75ddd316e66f4c4e8b921ad63782bb2ee5b0240170b2782f2d46abdf
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 87364d25fad7cf3c8f3cf86fc592ab668cc412bbbcef7b2d76ebb2aa4f46a9f6
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e1a7d63f75ddd316e66f4c4e8b921ad63782bb2ee5b0240170b2782f2d46abdf
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5A714775A00619DFCF18DF54D488A9EBBF4FF08314F048499E816AB292CB78ED85CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007F7206
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007F723C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007F724D
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007F72CF
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: DllGetClassObject
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 93593074482d87de4027c23ec90c9bdeb315638e7ac8e0975639b04c3e6ea642
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C415071604208EFDB19CF54C885AAA7BB9FF48310F1480ADBE059F30AD7B9D945DBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823E35
                                                                                                                                                                                                                                                                                                                                                                                                    • IsMenu.USER32(?), ref: 00823E4A
                                                                                                                                                                                                                                                                                                                                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823E92
                                                                                                                                                                                                                                                                                                                                                                                                    • DrawMenuBar.USER32 ref: 00823EA5
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d55c8d1a47b00fd2991afd5e3b6711c16ad500ba22725e49c2c386ca9c3943bb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50416A79A01219EFDB10DF50E894AAABBB5FF48354F054029E905E7250D734EE89CF91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007F1E66
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007F1E79
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 007F1EA9
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7ed25f5f453f688c56392dc0c825baa4b361610412199d26aaccbe21929d0c8b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 559f1ec90550be6446529e8a99a002d8a736057f2985fa7820d1b4fb68c02fe9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7ed25f5f453f688c56392dc0c825baa4b361610412199d26aaccbe21929d0c8b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1821D371A00108EADB14ABA5DC59CFFB7B8EF56360F54451DFA25A72E1DB3C490AC620
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00822F8D
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 00822F94
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00822FA9
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00822FB1
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SysAnimate32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 18073cb6d3dd3e43675465eb5d39bbbce3c6a63d1cb4615b7d63754fb3981594
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E621ACB2200229BBEF309F64ED84EBB37B9FB59364F104229FA50D2190DB71DC919760
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002), ref: 007B4D8D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007B4DA0
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000), ref: 007B4DC3
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9d4cb54ed74e6fc307e5edcf64e97458b29f77252d161bcf3ad24038c5dffffd
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8EF04F34A40208BBDB619F90DC49BEEBBB5FF44752F0040A4F905A22A1CB795951CED0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ee1acf3151fa4006b4d5e0e06500080882bb26d853075f66335b0f86881fef63
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26E08C36A02A22AB96321B25BC1AE7F7658BF81BA3B054125FC01E2200DB68CD0380E0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6acdf6ab29245bd8aa0d82a64eed505104305f8e839b5cc0a183f8f228cf4478
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E0D0C232902A31574A321B247C09DAF3A18FF85B613054110BC00E2310CF28CD13C1D0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802C05
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?), ref: 00802C87
                                                                                                                                                                                                                                                                                                                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00802C9D
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CAE
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CC0
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: File$Delete$Copy
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3226157194-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ea6a2be5f282c1ae43c5865399dd35d5bb1b7ba7dab978455f10fd2b7dfb95d2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: eb4f17b09afc4d5350cf74a1c9c61dff4f77ad6c54530ffce62ae28616c55fc5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ea6a2be5f282c1ae43c5865399dd35d5bb1b7ba7dab978455f10fd2b7dfb95d2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32B16071D00129EBDF61DBA4CC89EDEB77DFF48350F1040A6FA09E6191EA749A448F61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 0081A427
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0081A435
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0081A468
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0081A63D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3488606520-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a44294991d50a581645082260ad569cee07036f6cb7b27908279658a5e44286b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: fd8f3eef3f8b01634878083ae97a8859cda97d34094f9e8ac505443b9be90157
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a44294991d50a581645082260ad569cee07036f6cb7b27908279658a5e44286b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 23A1AF726043009FDB24DF24D88AB6AB7E5FF88714F14881DF55ADB292D7B4EC418B92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00833700), ref: 007CBB91
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0086121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007CBC09
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00861270,000000FF,?,0000003F,00000000,?), ref: 007CBC36
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CBB7F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CBD4B
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1286116820-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b66c7e117b2bb5d40a607535a96d5acdb84472d531d12a7ce96bcb846894c069
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 342bb3ba91df9d9b8e1b25479f922d90939ff7d36435bac56c422ad2c51cc873
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b66c7e117b2bb5d40a607535a96d5acdb84472d531d12a7ce96bcb846894c069
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB51C671900209EFCB20DF659C8AEAEB7B8FB40350F15426EF554E7291EB789D418BA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 007FE473
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 007FE4AC
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FE5EB
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FE603
                                                                                                                                                                                                                                                                                                                                                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 007FE650
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3183298772-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d6b704732540cc3a0d89cb3f2006f6ce2559af6a7e73ea30863d66092f642fa2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC5154B24083899BD724EB94DC859EFB3DCAF85340F00491EF789D3251EF78A5888766
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                                                                                                                                                                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BAA5
                                                                                                                                                                                                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BB00
                                                                                                                                                                                                                                                                                                                                                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0081BB63
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 0081BBA6
                                                                                                                                                                                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0081BBB3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 826366716-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8236acd5c0f446657fd403e85cda59146bf696b18340349892a685deb6e42306
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6961D371208241EFD714DF24C894E6ABBE9FF84318F14855CF4998B2A2DB31ED85CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 007F8BCD
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32 ref: 007F8C3E
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32 ref: 007F8C9D
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 007F8D10
                                                                                                                                                                                                                                                                                                                                                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007F8D3B
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4136290138-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 68d8ef60a2c602ea55840534dc9844bd2d10e30c964f0411f75ac9c99ea7e672
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 165169B5A00619EFCB10CF68C884AAAB7F8FF8D310B158559EA15DB354E734E911CFA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00808BAE
                                                                                                                                                                                                                                                                                                                                                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00808BDA
                                                                                                                                                                                                                                                                                                                                                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00808C32
                                                                                                                                                                                                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00808C57
                                                                                                                                                                                                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00808C5F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2832842796-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5456b6fe53ef368b671d4df5907c8b2d1766cda2fb66840573336f9d7d0cfa46
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9693068e23556ded42deb05fe26731d2be5693ce659d8b0bd00e6de84b7a279e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5456b6fe53ef368b671d4df5907c8b2d1766cda2fb66840573336f9d7d0cfa46
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB513735A00214DFDF55DF64C885A69BBF5FF49314F088058E849AB3A2DB35ED51CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00818F40
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00818FD0
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00818FEC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00819032
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00819052
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00801043,?,7529E610), ref: 007AF6E6
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,007EFA64,00000000,00000000,?,?,00801043,?,7529E610,?,007EFA64), ref: 007AF70D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 666041331-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 50c67ea88bc73ac51b1f0e23c8e1a8414c8b4ce85f843cdffdb2a59aa8a7526b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3515934A04605DFCB14DF58D499CADBBF5FF49314B0580A8E84A9B362DB31ED86CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00826C33
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00826C4A
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00826C73
                                                                                                                                                                                                                                                                                                                                                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0080AB79,00000000,00000000), ref: 00826C98
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00826CC7
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3688381893-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2cf9ad673e5114b4f9ac8947e378deb605d71bb8fd8ae1b0804950d002100811
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5941E735604124AFDB24EF28DC59FB97BA5FB09360F150268F895E72E0E371EDA1CA40
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 269201875-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f72d02d356192d33150cee8e2916de621427d8145a17f52c3ac96bac89144724
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1D41BE32A00204DFCB24DF78C885F5AB7A5EF89314B1545ADE615EB392DA35AD02CB80
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 007A9141
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                                                                                                                                                                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4210589936-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b03986f67c07b328cd0d2e7f27110c31a282a2f7f7ce54e02fe6fc50b9f18b6d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C415E3190865AFBDF199F69C848BEEB775FF4A320F208315E525A7290C7385950CB51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetInputState.USER32 ref: 008038CB
                                                                                                                                                                                                                                                                                                                                                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00803922
                                                                                                                                                                                                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 0080394B
                                                                                                                                                                                                                                                                                                                                                                                                    • DispatchMessageW.USER32(?), ref: 00803955
                                                                                                                                                                                                                                                                                                                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2256411358-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 85d3973068ac30a546bef2461c2eb647f4121ee5b269fd9392a8d8133c261292
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4E31CE709043469EEF758B349D09BB67BACFB02304F094569E462C22E1E3E49A85CB21
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CF38
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 0080CF6F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFB4
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFC8
                                                                                                                                                                                                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFF2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3191363074-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ce32eada3779143967ea155230b6b8b7eb1d06ecf1f72191dc060797cf09cfaa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e59d625afeff1c7448b04bf7b60fe3b49bca9c32317ecac5600df0db6cfe5e3b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce32eada3779143967ea155230b6b8b7eb1d06ecf1f72191dc060797cf09cfaa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1E317C71600206EFDB60DFA5CC849AFBBF9FF04354B10852EF506D2180DB70AE419BA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 007F1915
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 007F19C1
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 007F19C9
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 007F19DA
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007F19E2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3382505437-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 67303d20ee03eac4c68fdb44a30a179acaa6986cd76e965952f60e1cfdea8341
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0231E27190025DEFCB14CFA8CD99AEE3BB5FB04314F408229FA21A72D0C3B4A954DB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00825745
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 0082579D
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008257AF
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008257BA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 763830540-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2c9fb4cafe48b8b750e9ad79a6becf905c19bef0239417ed5f4bb014ac6c705a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B821B671944628DADB209F64EC84AEEBBB8FF14324F108216F929EB181D770D9C5CF50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • IsWindow.USER32(00000000), ref: 00810951
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00810968
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 008109A4
                                                                                                                                                                                                                                                                                                                                                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 008109B0
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 008109E8
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4156661090-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 62b1ffc71d99cc402b4192dfd07628f5839947fe8e94332bd0d4c7c331be9ecd
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5218335A00104AFDB14EF68DC88AAEBBE9FF44700F048028E846D7751CA70AC44CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 007CCDC6
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007CCDE9
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                                                                                                                                                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007CCE0F
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CCE22
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007CCE31
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 336800556-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b98becbbfeebc5e5f44dbaaf7b06f096d883cc379f6e196f7c9bb6bc71290ea1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2cc812852d1a3dfd2522334151d62c93b5f6d290f7fdc0138effde8837074abc
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b98becbbfeebc5e5f44dbaaf7b06f096d883cc379f6e196f7c9bb6bc71290ea1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5201A7726016157F23325AB66C8DE7F7B6DEEC7BA1315412DFD09D7201EA698D0281F0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                                                                                                                                                                                                                                                                                                                                                                    • BeginPath.GDI32(?), ref: 007A96B9
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 4b92ee2fc058a9caa119e4128dddc23048fa2587ad454f947103b362d2154c0d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 99217F30802305EBEF119F64DC19BA93FA8BF81315F594316FA10A61A2D3B958A2CF94
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _memcmp
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7a3f9b5a0537414ffd953ea22e38172ff7d6ec28caa7ef21c44c9d84db6f006e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8C019262645A1DFAD6086511ED92FFB639CEB213A4B804030FF15DB342F66CED50D2B0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6), ref: 007C2DFD
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2E32
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2E59
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E66
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E6F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast$_free
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3170660625-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 57bfd2d5198fc4ea6401f1db85feaf889fe47762c2f187ac33d436e10e1e476e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b24450939e7497a007849b57a2301b3c51027cff1d81f9372c60ed55cf2c22f4
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 57bfd2d5198fc4ea6401f1db85feaf889fe47762c2f187ac33d436e10e1e476e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0D01A436245A00BBDA2267756C4DF2F276DBBD17B5B25852CF425B22A3EB7C8C074520
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                                                                                                                                                                                                                                                                                                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                                                                                                                                                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                                                                                                                                                                                                                                                                                                                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0070
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3897988419-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a2125aeb44c5a73a12cd19613db96e2d1be9e979f033a37e0da623719bead479
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98017C76600208BBDB204F68DC08BBE7AADEB44751F148124FA05D2311DB79DD419BA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 007FE997
                                                                                                                                                                                                                                                                                                                                                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 007FE9A5
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000), ref: 007FE9AD
                                                                                                                                                                                                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 007FE9B7
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32 ref: 007FE9F3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2833360925-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d84977f14dec37f889ecf8f2f1f1a60b4e23ae4dbb112653ab5355aab647627f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E3013931C01A2DDBCF10DBE4D8496EDBB78BB09700F004546E612B2261DB78A556C7A2
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                                                                                                                                                                                                                                                                                                                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 842720411-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0be5c77d4da5a67cdadf061c86483f7c9ee0a92a20ec14aa5c9ac1eeb412f6b7
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC011D79500209BFDB214F69DC59A7A3B6EFF85360B504419FA45D7350DB31DC119A60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 44706859-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 69b44ef0a7a571a7fc72ada32ea40bbec05366971963ae4d8445d356cff19a5e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39F04936200305FBDB214FA49C4EF6A3BADFF89762F608424FA45C7251CA74DC518A60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 44706859-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0fc5f04ed6cf184179832a18ab3e460f8ad1034529d685f4d2114bfe70f531ef
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 01F06D35200305FBDB215FA4EC49F6A3BADFF89761F604424FA45C7350CE74D8518A60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800324
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800331
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080033E
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080034B
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800358
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800365
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseHandle
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2962429428-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a61701e7636aa8e519d3846c5d9b84deba097dc8f129879f94aec0c56ce1e71b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4F019C72800B159FCB31AF66DC80916FBF9FE603157168A3ED19692A71C3B1A959CE80
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD752
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD764
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD776
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD788
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007CD79A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ea7f4c04a37592d4226da17255a5915d059589eccacc158cae59a5babb6eb6d3
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DEF01D72544304AF8631EB68F9CAE1A7BDDBB44711BA5082DF049E7512CB3CFC818E64
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 007F5C58
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 007F5C6F
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBeep.USER32(00000000), ref: 007F5C87
                                                                                                                                                                                                                                                                                                                                                                                                    • KillTimer.USER32(?,0000040A), ref: 007F5CA3
                                                                                                                                                                                                                                                                                                                                                                                                    • EndDialog.USER32(?,00000001), ref: 007F5CBD
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3741023627-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f723b69c290a4284f45c7ecb2836ba5cfb8aca0b7466e9ea9d702540ab6a6e24
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D8018670500B09ABEB305B50DD4EFBA77B8BF10B05F00555DA783A15E1DBF4A985CAA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C22BE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C22D0
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C22E3
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C22F4
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C2305
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: cccf5b1b0fa6628047e221acafad41eea2aebd12de54f9c0f0ecbb7f14d0538d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30F03A708402209F8A12AF54BC09E093FA4F718761706251EF414E23B7CBB81912EFA8
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • EndPath.GDI32(?), ref: 007A95D4
                                                                                                                                                                                                                                                                                                                                                                                                    • StrokeAndFillPath.GDI32(?,?,007E71F7,00000000,?,?,?), ref: 007A95F0
                                                                                                                                                                                                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 007A9603
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteObject.GDI32 ref: 007A9616
                                                                                                                                                                                                                                                                                                                                                                                                    • StrokePath.GDI32(?), ref: 007A9631
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2625713937-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e1d987cc094bc0c056b66cd8d03ad7f3f0b339c8d9227ac3e6db3af753f9160c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ACF08C31405604EBEF264F24EC1CBB83F64BB42322F488314F525550F2C7B489A2DFA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: __freea$_free
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: a/p$am/pm
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3c45930e3ed7bdb636858c06d944d3b26b047fc8bc6db50f61335ffb0592f0fb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1809bfa23de52f882b40e9b08f9f5ac67f05e28728775a4a2bbdcff6c0b88da9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3c45930e3ed7bdb636858c06d944d3b26b047fc8bc6db50f61335ffb0592f0fb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8CD1CF35A00286CADB249F68C855FBAB7B1FF07704FA8417DE901AB652D37D9D80CB91
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: JOy
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-3698608982
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2ab4f409f9433661c07d3e64e2b649d512ba2028e6a8a0258fab52e664a56e56
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 785190B590060AEFCB219FA4CD49FEE7FB4EF05310F14015EF405A7292D67AA9818B61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007C8B6E
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007C8B7A
                                                                                                                                                                                                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 007C8B81
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: .{
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2434981716-1852962426
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f331ee36d80cf53ca6fdbd9faa851b22a7e23bfae06fe63449520c64917b4dcc
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32419DF0604145AFDB649F24CC85FBD7FA5EB85300F2881AEF89587242DE39CC028B95
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21D0,?,?,00000034,00000800,?,00000034), ref: 007FB42D
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007F2760
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 007FB3F8
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FB32A: GetWindowThreadProcessId.USER32(?,?), ref: 007FB355
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB365
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB37B
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F27CD
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F281A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: da626f5285d071faa05103576e1db59013f59330e4f83930e1b19990f3c9f7df
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 81412E7290021CAFDB10DFA4CD46AEEBBB8EF09740F104059FA55B7281DB746E45CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 007C1769
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C1834
                                                                                                                                                                                                                                                                                                                                                                                                    • _free.LIBCMT ref: 007C183E
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free$FileModuleName
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2506810119-517116171
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0e3a1dc7ed5f80b08c94ef5ad30b9528731a34359b87e552975426576fd8fe94
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E318475A44218EFDB21DF999C89E9EBBFCEB86310B54417EF404D7212D6B48E40CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007FC306
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 007FC34C
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00861990,01215370), ref: 007FC395
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6dc4d9f0f2bfba50dc6ba8fa89b21e0c941a270a988c067b9272b8554039072c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4D418C312043099FD721DF29D985B6ABBE4BF85360F108A1DFAA5973D1D738E904CB52
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0082CC08,00000000,?,?,?,?), ref: 008244AA
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32 ref: 008244C7
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008244D7
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Long
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SysTreeView32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 28b2117036ceb1d3c1b52b10cca20da895430fa480b57b39056ff406b64efd92
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3A319C71201215ABDF209E38EC45BEA7BA9FB08324F205315F975E21D0D774EC919B60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0081335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00813077,?,?), ref: 00813378
                                                                                                                                                                                                                                                                                                                                                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0081307A
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0081309B
                                                                                                                                                                                                                                                                                                                                                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00813106
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 255.255.255.255
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: df30ddab7b2fb1622f722f5d30d3fa3e52f0596b13bde341db7922644507000e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D631A1356002059FDB20CF68C485EA977E8FF18318F248099E915DB392DB71EE85C760
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00823F40
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00823F54
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00823F78
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$Window
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: SysMonthCal32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: eed551f5131fc66b1a91a063a7e807f437a2708b6ff4fdc0c3e264c2b1269b47
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5521BF32600229BBDF218F54EC46FEA3B75FF48724F110214FA15AB1D0DAB9AC95CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00824705
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00824713
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0082471A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: msctls_updown32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 99923f0b74b92273343e68074b1eac92e89b9e6e19255b7e75186c8cb9db2c05
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A5217CB5600218AFEB10DF68EC85DBA37ADFB5A394B041059FA11DB251CB70EC51CA60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2337bf96ade7e6241a6e27ab549ce630c068349ff6f26f2e68f5de98fb6feb8b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: b25e52b650acf198db8d2f7aaede2804ef34910d6299646cbf198d5cea58d20b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2337bf96ade7e6241a6e27ab549ce630c068349ff6f26f2e68f5de98fb6feb8b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50215B72104525A6C731AB24EC06FB773ECEF91310F104026FB59D7282EB5DED51C295
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00823840
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00823850
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00823876
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Listbox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 872e194d92a2c779bb3adcb4c9c401ae704b5e88e1bfcb3564b24e1d0787bdf0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C218E72610228BFEF219F54EC85EBB376AFF89754F118124F9149B190C675DC928BA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00804A08
                                                                                                                                                                                                                                                                                                                                                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00804A5C
                                                                                                                                                                                                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,0082CC08), ref: 00804AD0
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %lu
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 71eeeea773c4d6cb3d9d3a0776ad93406c9961d05cfc2f2a237fbe42fe325330
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 36314C71A00119EFDB10DF64C885EAA7BF8FF09308F1480A9E909DB252D775EE46CB61
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0082424F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00824264
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00824271
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: msctls_trackbar32
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7f9b059427b039ba6c580b4902e66c176a70e4d61e5cad8bb3d55578c0878d6f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA110231240218BEEF205F29DC06FAB3BACFF95B64F110124FA55E20E0D2B1DCA19B20
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F2DA7: GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFocus.USER32 ref: 007F2F78
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F2DEE: GetParent.USER32(00000000), ref: 007F2DF9
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 007F2FC3
                                                                                                                                                                                                                                                                                                                                                                                                    • EnumChildWindows.USER32(?,007F303B), ref: 007F2FEB
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %s%d
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f22ab5bfad28fa38f56a2aad36bdcf81f412d27387f7deb4faefede5dee0c738
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5311A5B1700209ABCF547F709C89EFD376AAF94304F048075FA099B353DE78994A8B60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258C1
                                                                                                                                                                                                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258EE
                                                                                                                                                                                                                                                                                                                                                                                                    • DrawMenuBar.USER32(?), ref: 008258FD
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5c50c86375f8bf54d68ee57ee824b9caf333ad2cc94fe8fdd10d104d45cb276f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 090c677cb0ad9d8b08fe6c84af568d453e89b1d36e28aa3cd236768e15ff5957
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5c50c86375f8bf54d68ee57ee824b9caf333ad2cc94fe8fdd10d104d45cb276f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61018C31500228EFDB219F51EC48BAEBFB4FF85360F1080A9E849D6151DB308AC4EF21
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 007ED3BF
                                                                                                                                                                                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32 ref: 007ED3E5
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3013587201-2590602151
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 6783ed2285d3e07a9710962bbff66dc38842691a3cd55530665e77e82b42d006
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E9F0AB72807AA1DBC77112664C5893E3318FF1AB11B698355F612E6291DB2CCC8482E2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2bdac5f637c3a7cb700077af051cb6e132dc135858e9cb56f18bfbb190dfd6aa
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8C13875A0020AEFDB14CFA4C898ABEB7B5FF48714F208598E605AB352D735ED41DB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1998397398-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: becb205b14d91e64db8b49917d2313193dc44cb1a479c3d607c4e7c9c362af44
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75A15C75208200DFCB14DF28D485A6AB7E9FF88714F058859F98ADB362DB34EE45CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F05F0
                                                                                                                                                                                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F0608
                                                                                                                                                                                                                                                                                                                                                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,0082CC40,000000FF,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F062D
                                                                                                                                                                                                                                                                                                                                                                                                    • _memcmp.LIBVCRUNTIME ref: 007F064E
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 314563124-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1c93727aaa82403371f639cdf317c963a4afa0bcbf6dc3fba052054baa16f9ae
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A811971A00109EFCB04DF94C988DEEB7B9FF89315B204558E616EB251DB75AE06CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0081A6AC
                                                                                                                                                                                                                                                                                                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0081A6BA
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0081A79C
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0081A7AB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007ACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007D3303,?), ref: 007ACE8A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1991900642-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e3262eef2bb74302c1ce9bc177b7bd7af68209acfb6809602f69fddb0b82dd80
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 66db602c2fdbe8bc149b84d02d23b0c22b4f552c3895cc73c5ab1fc4c0d7aaef
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e3262eef2bb74302c1ce9bc177b7bd7af68209acfb6809602f69fddb0b82dd80
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF513B71508300AFD714EF24D88AA6BBBE8FF89754F40892DF585D7291EB34D904CB92
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _free
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 269201875-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f404493e087296ae96afd02fda80a5b7cab1065a08292c891b058e4960df0956
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 74cef0a22e21d37764e880a7797e4aecfc8770902acb2b6bc33ea99cbfb58e8b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f404493e087296ae96afd02fda80a5b7cab1065a08292c891b058e4960df0956
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64412536A00540FBDB25AAB89C4ABEE3BB4EF41730F54422BF41992392E67C88419261
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 008262E2
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00826315
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00826382
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3880355969-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: dec6a5c39f23260e25cf14d7b6c086c5f8e7a0ae2b556fe6b10c28f89ed24342
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A8512A74A00219EFCF20DF68E885AAE7BB5FF45360F108159F815DB290E771AD91CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00811AFD
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00811B0B
                                                                                                                                                                                                                                                                                                                                                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00811B8A
                                                                                                                                                                                                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00811B94
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorLast$socket
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1881357543-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 43ea4a203e4e290b0eaba66784a8a18dcb8f620fae8c37e9e31b3116af9f9333
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AD41D235600200AFDB20AF24D88AF6977E5EF49718F54C548F61A8F2D2D776ED818B90
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ae0544c8c7324c5d1948c058ea41047b5507a8cf52001c23db766e6c52dae8a9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CB410876A04344FFD7289F78CC46FAABBB9EB88710F10452EF541DB282D7799A018780
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00805783
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 008057A9
                                                                                                                                                                                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008057CE
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008057FA
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3321077145-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 56a1cb4b625ec48848e65fc286534cc65d5a6fd48d375079bfbcff26cade7aaf
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F9410735614610DFCF15DF15D548A1EBBE2EF89320B19C498E84AAB362CB34FD01CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,007B6D71,00000000,00000000,007B82D9,?,007B82D9,?,00000001,007B6D71,?,00000001,007B82D9,007B82D9), ref: 007CD910
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CD999
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007CD9AB
                                                                                                                                                                                                                                                                                                                                                                                                    • __freea.LIBCMT ref: 007CD9B4
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2652629310-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 39bea2d22807ee29739ba97aa967af0e89f6bfd3e894641ab22552928882788c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: bdac8942d33a6d615343ad074f0efd54c83ce0ae769463bd6efa2dddb080c078
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39bea2d22807ee29739ba97aa967af0e89f6bfd3e894641ab22552928882788c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3231A972A0020AABDB34DF65DC85EAE7BA5EB41310B05426CFC04D7291EB39ED51CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00825352
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00825375
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00825382
                                                                                                                                                                                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008253A8
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3340791633-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 19b1a1bacbf31a7601752b8a42a450190e996cc74a096a5a7282761a169c9dd9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D1318E34A95A28AEEB30DA14EC1EBE97765FB06390F586102FA11D63E1C7B49DC09B41
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 007FABF1
                                                                                                                                                                                                                                                                                                                                                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 007FAC0D
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 007FAC74
                                                                                                                                                                                                                                                                                                                                                                                                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 007FACC6
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 432972143-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: df4777d6467e607ad501833310352ada1548b7d18afcbce412462cfabe4a2e1c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9E3116B0A0465CBFEB348B658C087FE7BA6BB49310F04421AE689523D0C37D8985C772
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 0082769A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00827710
                                                                                                                                                                                                                                                                                                                                                                                                    • PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBeep.USER32(00000000), ref: 0082778C
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1352109105-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 63dc7b9b374a7e618ef140a2bf4304401deb5d122b55c937cd061e79f82d510a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB41BF34605265DFDB11CF5AE898EA9BBF4FF48304F1980A8E814DB261C370E982CF90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 008216EB
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCaretPos.USER32(?), ref: 008216FF
                                                                                                                                                                                                                                                                                                                                                                                                    • ClientToScreen.USER32(00000000,?), ref: 0082174C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00821752
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2759813231-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e2c1cdd0b22015534ac2db8a3f9c1477a37f179ef19d37bb310800070b0adccb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26316172D00109AFCB00EFAAD885CAEB7F9FF88304B548069E415E7211EB359E45CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FDFCB
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FDFE2
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007FE00D
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 007FE018
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3763101759-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5e29907c695f5c37d6125eabaeb376a73b941a647a1d98cc3223a554da4c6575
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 18f617b0a256d5efc7d52c281d157c89c2cff8578e53cc6b967a313241741760
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5e29907c695f5c37d6125eabaeb376a73b941a647a1d98cc3223a554da4c6575
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48219F71900218EFCB219FA8D985BBEB7F8EF85750F244065E905FB342D6789E41CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00829001
                                                                                                                                                                                                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007E7711,?,?,?,?,?), ref: 00829016
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 0082905E
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007E7711,?,?,?), ref: 00829094
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2864067406-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: dcbf51fa8d186fedacea90e1784b200574220a761e9051b898554290e36dca5f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7021BC31600428EFCB268F94D858EFA7BF9FF8A350F054169F9458B261C335A990DB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?,0082CB68), ref: 007FD2FB
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007FD30A
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 007FD319
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0082CB68), ref: 007FD376
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2267087916-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: bbac94718232e9e6193ce0b20a50c3365e0d16d0214ba955af25d44a6d8fddea
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6B214871508205DF8720DF28D88587AB7E5BE5A324F104A1DF6A9C32A1EB359D46CB93
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                                                                                                                                                                                                                                                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007F15BE
                                                                                                                                                                                                                                                                                                                                                                                                    • _memcmp.LIBVCRUNTIME ref: 007F15E1
                                                                                                                                                                                                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F1617
                                                                                                                                                                                                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 007F161E
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1592001646-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: bb1ff01d01db9411ebc7a86bd4e5bbde39d71b4f47cb0e2d75d53baebc4a250d
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D3218931E00108EFDF10DFA4C949BFEB7B8EF44354F498459E541AB241EB39AA05CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0082280A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822824
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822832
                                                                                                                                                                                                                                                                                                                                                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00822840
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2169480361-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 28247d15c1c552a01425aa1cd9e44e9ba221e3511074ce3f31888b53a2ddcdd7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2f6a5e980ed60f651754094ae9555e79638e87b69eb55b66331ac30aa2bb7bf5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 28247d15c1c552a01425aa1cd9e44e9ba221e3511074ce3f31888b53a2ddcdd7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F219031208525BFD7149B24E845FAA7B95FF49324F148258F426CB6E2CB75EC82CB90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8D8C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F8D7D: lstrcpyW.KERNEL32(00000000,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F8DB2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F8D7D: lstrcmpiW.KERNEL32(00000000,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8DE3
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7923
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrcpyW.KERNEL32(00000000,?,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7949
                                                                                                                                                                                                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7984
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: cdecl
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 440a87fdecafdccea38e7dc0b950dbb6345f3c644fc9f68453d1ec63bcff4f7b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 2efd1c7f64b1d5f9edb73bedca28d971195a0c8421e74bb15e000294466c8c1c
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 440a87fdecafdccea38e7dc0b950dbb6345f3c644fc9f68453d1ec63bcff4f7b
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9411293A200305ABDB259F34CC49D7A77A9FF85350B40812AFA42C73A4EB759811C791
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00827D0B
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00827D2A
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00827D42
                                                                                                                                                                                                                                                                                                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0080B7AD,00000000), ref: 00827D6B
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$Long
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 847901565-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e61e94a71934280f34621f31d5c2415608424896657cf8685f04033ec0db43d4
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9E11AF31605625AFCB109F29EC08ABA3BA5FF45360B158728F939D72F0D7309991CB50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 008256BB
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008256CD
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008256D8
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 455545452-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9580ba114db35a460aa99e384bd952381e1fec8b97963af23a42f51afb01273b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC11D671640628E6DF209F65EC85AFE77ACFF10764B508026F915D6081E774D9C0CB64
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5d1d9116291f3bf625392743c4352ad5af5a87754d6127a94f8ecead1a3439bb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8ff448bee66c02902c46854629027e3bd73dc1b30be42a9eeeecbaa1023661bd
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d1d9116291f3bf625392743c4352ad5af5a87754d6127a94f8ecead1a3439bb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 99018FB2305A167EF62116786CC5F27671CEF423B8B75033DF522611E7DB689C0156A0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 007F1A47
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A59
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A6F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A8A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3850602802-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 5a47171de14f4719f2f1bf5b11cebf853f023f0c7d15a2fdefdf77ccbdbd4e41
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C611393AD01219FFEB10DBA5CD85FADBB78FB08750F604091EA00B7290D6716E50DB94
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 007FE1FD
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 007FE230
                                                                                                                                                                                                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007FE246
                                                                                                                                                                                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007FE24D
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2880819207-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 9be8e62d510130bb3115779cbd67d94ef22820cf0ee953cf8ac70a1b9617dcd6
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8112B72904258BFDB119FA89C09ABE7FACBB45320F148615F915D3391E3B8CD0087A0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,?,007BCFF9,00000000,00000004,00000000), ref: 007BD218
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007BD224
                                                                                                                                                                                                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 007BD22B
                                                                                                                                                                                                                                                                                                                                                                                                    • ResumeThread.KERNEL32(00000000), ref: 007BD249
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 173952441-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d2491451abcd09d99ba66d60cdfd2e6fe60374c026b0afd2eeb7af0e877b2284
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FA019276805208BFDB316BA5DC0EBEE7A69FF81731F204219F925961D0EB798D01C7A1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                                                                                                                                                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00829F31
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00829F3B
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00829F46
                                                                                                                                                                                                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00829F7A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4127811313-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: d17fb3e55335ee5a8a90d542596ac25abb564b5d7dd70bffa6c14a9457cee82f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4811883290012AABCB10DFA8E9899FE77B8FF05301F004451F951E3140DB30BA82CBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00796060
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3970641297-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 649f7ed021d05210978879e7beaf8fb5e47d7bcd81fd7d81fbd8d651ce7c3a7e
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 74118072501508BFEF224FA8EC94EFABBA9FF187A4F044216FA1452110D736DC60DBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 007B3B56
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007B3AD2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007B3AA3: ___AdjustPointer.LIBCMT ref: 007B3AED
                                                                                                                                                                                                                                                                                                                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 007B3B6B
                                                                                                                                                                                                                                                                                                                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007B3B7C
                                                                                                                                                                                                                                                                                                                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 007B3BA4
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 737400349-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 74ef203f8404c04de63dca05f9643c6fa68434eee9a0fbc3489288d6a3aa2ded
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34012972100148BBDF126E95CC46EEB7B6AFF48754F044014FE4896121C73AE9A1EBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007913C6,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue), ref: 007C30A5
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000,00000364,?,007C2E46), ref: 007C30B1
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000), ref: 007C30BF
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3177248105-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 94430d53c4350698327f89ee7c31950224ba3f1146844ac23cc6739af6d14d51
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FA01FC33301626ABCB314B78AC44F67779ABF45B61B11872CF906D3140CB25D942C6D0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 007F747F
                                                                                                                                                                                                                                                                                                                                                                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007F7497
                                                                                                                                                                                                                                                                                                                                                                                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007F74AC
                                                                                                                                                                                                                                                                                                                                                                                                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007F74CA
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1352324309-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: e5a028c78039ed2585c85dc2b877a64bb51c90c581979d31e96c5f1a368362a5
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC11ADB1205359ABE7309F14EC09BB67BFCFB00B10F108569E626D7291D7B4E904DBA1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0C4
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0E9
                                                                                                                                                                                                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0F3
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB126
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2875609808-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 51ec25283e899556c58d85ba53db7cef61f08a6928e85138ecc0552e2a897357
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 59116D31C01A2CE7CF10AFE4E9696FEBF78FF49711F108086DA41B2281CB3896518B51
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00827E33
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00827E4B
                                                                                                                                                                                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00827E6F
                                                                                                                                                                                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00827E8A
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 357397906-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0871379442132902b3a80bd569fa975a113ca82492f0ac68eb881d4cf8bfdc6f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ba943ced25b84adc69aef8ac3e92956145d63f19cf6fd734b492b09e474459e9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0871379442132902b3a80bd569fa975a113ca82492f0ac68eb881d4cf8bfdc6f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F91140B9D0020AAFDB51CF99D884AEEBBF9FF18310F509066E915E2210D735AA55CF90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                                                                                                                                                                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2710830443-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7e7ab9f835e1eedfd7dc54f57ec6be4f01340ca11954cc1a8e0ed6d52a237c17
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71E06DB12016287BE7301B629C0EEFB7E6CFB52BA1F404119B206D11819AA88842C6B0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00828887
                                                                                                                                                                                                                                                                                                                                                                                                    • LineTo.GDI32(?,?,?), ref: 00828894
                                                                                                                                                                                                                                                                                                                                                                                                    • EndPath.GDI32(?), ref: 008288A4
                                                                                                                                                                                                                                                                                                                                                                                                    • StrokePath.GDI32(?), ref: 008288B2
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1539411459-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ba179a81d04382f52a6ebd9d61b7c1a74f78329970f9bec3771598d8d387597b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 51F03A36042668FAEF225F94AC0EFDE3E59BF06310F448100FA11A50E2C7B55562CBE5
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000008), ref: 007A98CC
                                                                                                                                                                                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 007A98D6
                                                                                                                                                                                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 007A98E9
                                                                                                                                                                                                                                                                                                                                                                                                    • GetStockObject.GDI32(00000005), ref: 007A98F1
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 4037423528-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ab1bcd9601bbc3b16d26792a531a73e6530c3bf8084578ed03ac5591ef65d7cf
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 20E06D31244680AADB315B75AC0ABED3F20BB56336F04C21AF6FA580E1C3B58661DB11
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentThread.KERNEL32 ref: 007F1634
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F163B
                                                                                                                                                                                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007F11D9), ref: 007F1648
                                                                                                                                                                                                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F164F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3974789173-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 8ae857bfc7ca525678e06b5106d195f85112775f79470164ab3b858658559435
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A9E0E671601211DBD7301FA19D0DB6A7B7CFF55791F14C818F745DA090DA784446C754
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 007ED858
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 007ED862
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(?), ref: 007ED8A3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7dc18fd9b4e662c75f8986f0b97e0a18407046fa0765d73edf094ec7b88e2ef7
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3EE01AB1800204DFCF619FA0D80C67DBBB2FB18710F14C009F806E7250D7384942AF40
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 007ED86C
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 007ED876
                                                                                                                                                                                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                                                                                                                                                                                                                                                                                                                                                                    • ReleaseDC.USER32(?), ref: 007ED8A3
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 26318164d91b549577329d7ffa8b5a8e68778aed791330b2f99100973c68a6da
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A6E092B5C00204EFCF61AFA0D80C66EBBB6FB58711B149449F94AE7250DB385902AF90
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                                                                                                                                                                                                                                                                                                                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00804ED4
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Connection_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: *$LPT
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5c033fbfd8417142b1396d9f467892959e7292e99a7a15af2b32277e8576a01c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7f2dd9ff25f8f9d5d444f28604d637ffcd86b4f8b31426f700451e023d25b605
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5c033fbfd8417142b1396d9f467892959e7292e99a7a15af2b32277e8576a01c
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E5915EB5A04205DFCB54DF54C884EAABBF1FF44304F159099E90A9B3A2CB35ED85CB91
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 007BE30D
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ErrorHandling__start
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: pow
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1b2470f50562bee5b3c8127742f9986658c23543adb2cdb64525791d99035a10
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E512961A0C60296CB197714C945BFA3BE8BB50741F348D6CE096833A9EF3D8C95DE86
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: #
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 0-1885708031
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1d441742a6b82f36fce7762cc61817deea475513ed6297e82074bdb61db0d636
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7F513435501286DFDF25DF29C485ABA7BA4FFAA310F248559FC919B2C0D63C9D42CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000), ref: 007AF2A2
                                                                                                                                                                                                                                                                                                                                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 007AF2BB
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 64da553f5b4a3ee07643f61f6f5067a6f3013538241bf21f043bb36a76c79113
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BA516772418744DBDB20AF14EC8ABAFBBF8FB85300F81885CF1D941095EB748569CB66
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008157E0
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 008157EC
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: CALLARGARRAY
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: d7bb0339e454e17df098d95711c69c99a491c454b9ba04d1a8bbf4187e90f627
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f71176ef81a41e9b5ac0c537e10ef4d6f5562707acd245e556f585c354258f19
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d7bb0339e454e17df098d95711c69c99a491c454b9ba04d1a8bbf4187e90f627
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 76418C31A00209DFCB14DFA9C8869FEBBB9FF99724F104169E505E7291E7349D81CBA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 0080D130
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0080D13A
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: |
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 819c1fef96cca6512c7fd9359c783528300538ab935c47c8cd7ea8cea3c118b9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 22311971D00209EBCF15EFA4DC89AEEBFB9FF04340F000119F815A6162EB35AA06CB60
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 00823621
                                                                                                                                                                                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0082365C
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$DestroyMove
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: static
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f2ca701e3c00247ff59dc49c8eec1b6dd0fc7896dd6696a9518723e7c1e77418
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 56420c82864c857ae2b3a5e9274d8d6900e80c78e796ffc51634dd90d313c317
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f2ca701e3c00247ff59dc49c8eec1b6dd0fc7896dd6696a9518723e7c1e77418
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CD318F71110614AEDB209F28EC90EBB73A9FF98724F109619F8A5D7280DA35AD91D760
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0082461F
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00824634
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: '
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 00a4964598df136835bd8056418354f97085762d4c5b93b0dbb258c25dbe20e2
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2B313874A0121A9FDF14CFA9D981BDABBB5FF19300F14506AE904EB381D771A981CFA0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0082327C
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00823287
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Combobox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c19874b9e845657c378395590919058a9fa0ed8f2f6f18c519255929f67e5c80
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1111E271300218BFEF219E54EC94EBB3B6AFB943A5F104129F918E7290D6399D918760
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0082377A
                                                                                                                                                                                                                                                                                                                                                                                                    • GetSysColor.USER32(00000012), ref: 00823794
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: static
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 476b28e78ee812caa609133232d2c1193d0176faa6232ea4b352e42abfd08d30
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9B1129B2610219AFDF10DFA8DC45EFE7BB9FB08314F004525F955E2250E779E8519B50
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0080CD7D
                                                                                                                                                                                                                                                                                                                                                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0080CDA6
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Internet$OpenOption
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: <local>
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: c4d8fc1b5ae6d607e762ea3716b5fcb2d30cda9e23fd6c55dccafe2774fa3dd3
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A311A371215635BED7B44F668C45EF7BE69FF127A4F004326B909C31C0E6649845D6F0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 008234AB
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008234BA
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: edit
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 138c8761fc68c0d632bb9d0219267a30d46d8ce6b1569f8f5c403058d54a5ab8
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4411BF71100128ABEF216E64EC54ABB3B6AFB24378F504364FA60D31D0C779DD919B68
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 007F6CB6
                                                                                                                                                                                                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 007F6CC2
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: STOP
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 683588fcbf434ca7dcb0ce7d18724b8cca4c0c02ccb85b24b4dbc8873c352235
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2501263270052A9BCF20AFFDDC949BF73B4FB617107000528EAA293295EB39E804C660
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007F1D4C
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: a35a45f7ea954f98d71f5aab71628208fe3f5dd06029c01a09aac447cb2ea2de
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4301B571701218EB9F14EBA4DC59CFE73B8FB56360F44091EAA32673D1EA395908C670
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 007F1C46
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 79cd98f64539424afc9bc0ed86f27c75d21b319ef23002e7c6b929eab789810a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B901A77568110CE6DF14EBA4DD69DFF77A89B12340F54001DAA16773C1EA289E0CC6B1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 007F1CC8
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1797e5b7f96d57c8e21981343347e23c1b86737cdf9b2e5877a69474f7a17720
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E001DB71A4011CE7DF14EBA5DE15EFE77A8AB11340F540019BA1273381EA299F08C671
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                                                                                                                                                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 007F1DD3
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 230cd29f0aa3690de7c6681ab96e2c4ab472052c994f3b3bc53db75dc6be913a
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FDF0A971B41218E6DF14E7A5DC59EFE7778AB02350F44091DBA32633C1DA685908C271
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 7eaeed67d993a5841a7449fc8971d7b5067847596be7aad9b0a49975ab4573cb
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71E02B422042206093311279ACC5AFF569DEFC97A0714182FF981C2267EA989DD193A5
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007F0B23
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Message
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: f52267c549e52dd8c948277655a9d799ac63ba8ac79b86b0ed4608eebe2173fb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: cb4acf06fea1841e82f6a5cd4c2f9b54c95ac680113d91c675999978849da1cf
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f52267c549e52dd8c948277655a9d799ac63ba8ac79b86b0ed4608eebe2173fb
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 29E0D831244318AAD22036D47C07F9D7AC4DF05B51F100466FB58956C38AE9649006E9
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007AF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007B0D71,?,?,?,0079100A), ref: 007AF7CE
                                                                                                                                                                                                                                                                                                                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,0079100A), ref: 007B0D75
                                                                                                                                                                                                                                                                                                                                                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0079100A), ref: 007B0D84
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007B0D7F
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 55579361-631824599
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 0f444fe215b3e5e9297a2355cdfc3fc98f3384fd4cddb92ccb103d491989860f
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4AE039742003118BD7309FA8E4083967BF0FB00740F018A2DE482C6692DBB8E485CBD1
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0080302F
                                                                                                                                                                                                                                                                                                                                                                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00803044
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: aut
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 1112bb476bc0119a6db6099ebff125cb221dd4474c45e91966fe3c56f41f8ca9
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7BD05E72500328A7DA30A7A4AC0EFDB3B6CEB04751F4002A1BA55E2091EEB49985CAD0
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: %.3d$X64
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 024f023edb2cb0e06106a9e3ab918785cddcfe0e37c986ad8b78773d6d103d26
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E3D012A180A148E9CB7097E1DD498BAB37CFB4D341F508452FA16E1040D62CCD086761
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082232C
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0082233F
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 36007830800275cc06a0169619c0c4e48e04680b6c68c60c7c94045046c05542
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 171d1e66da8aa8da75d4195de7836ff97b3e12d8dd9e8da2b47a63ede3f65305
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 36007830800275cc06a0169619c0c4e48e04680b6c68c60c7c94045046c05542
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EBD0A932390300B6E2B4AB309C0FFEA6A04BB00B00F008A167705AA2E0C8F4A8028A10
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082236C
                                                                                                                                                                                                                                                                                                                                                                                                    • PostMessageW.USER32(00000000), ref: 00822373
                                                                                                                                                                                                                                                                                                                                                                                                      • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                                                                                                                                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: 4804e7bb71a4d1d427ea56754c6355f809b068711b7b92750428e03e46a45e08
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: ce53e60186df15dd93e3dfe62d3df5e96b13a2decb46665d0ebaa99cfd6bbc2b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4804e7bb71a4d1d427ea56754c6355f809b068711b7b92750428e03e46a45e08
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34D0C932391710BAE6B4AB709C0FFDA6615BB14B11F408A167755EA2E0D9F4B8068A54
                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007CBE93
                                                                                                                                                                                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 007CBEA1
                                                                                                                                                                                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CBEFC
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2153336308.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153311255.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153417783.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153485743.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2153516743.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 1717984340-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: f2a073a2eae75c8ba818b7af1c5a280cbd7290c4f3304bacf9e2b5088783a8a7
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB41D235600216EFDF218FA5CC8AFBE7BA5AF41720F14416DF9599B2A1DB388D05CB60

                                                                                                                                                                                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                                                                                                                                                                                    Execution Coverage:0.3%
                                                                                                                                                                                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                                                                                                                                                                    Signature Coverage:100%
                                                                                                                                                                                                                                                                                                                                                                                                    Total number of Nodes:6
                                                                                                                                                                                                                                                                                                                                                                                                    Total number of Limit Nodes:0
                                                                                                                                                                                                                                                                                                                                                                                                    execution_graph 5004 1d11e6396f2 5005 1d11e639749 NtQuerySystemInformation 5004->5005 5006 1d11e637ac4 5004->5006 5005->5006 5001 1d11e618e37 5002 1d11e618e47 NtQuerySystemInformation 5001->5002 5003 1d11e618de4 5002->5003

                                                                                                                                                                                                                                                                                                                                                                                                    Callgraph

                                                                                                                                                                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                                                                    • Source File: 00000011.00000002.3358726418.000001D11E613000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D11E613000, based on PE: false
                                                                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_17_2_1d11e613000_firefox.jbxd
                                                                                                                                                                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                                                                                                                                                                    • API ID: InformationQuerySystem
                                                                                                                                                                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                                                                                                                                                                    • API String ID: 3562636166-0
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode ID: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction ID: 35abcefef473c0013ebc88663c2ce5361f3b4a43bfa45b5db64773c2fb1a648b
                                                                                                                                                                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C3A3D131614A499BDB2EDF68DC857E973E5FB95300F44422EE94BC3295DE30EA42CB81