Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
microPHAZIR_5.4.0.135-windows-installer.exe

Overview

General Information

Sample name:microPHAZIR_5.4.0.135-windows-installer.exe
Analysis ID:1447782
MD5:fca4f3c56e1762703d00881bc8c4b6ce
SHA1:1f123ffd0e807ed6b26838e6baffb06c57c3f582
SHA256:12a114e8f0f20fdf0c4924f3539ed6f9a88aad4758b4511662c10e90cbbf37b8
Infos:

Detection

Score:36
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Antivirus detection for URL or domain
Contains functionality for read data from the clipboard
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://www.google.comURL Reputation: Label: malware
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\installbuilder_installer.logJump to behavior
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: certificate valid
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
Source: Binary string: Agent/work/bd24ebda5aee1e55/WebserviceHandler/bin/Release/WebserviceHandlerDLL.pdbFR,mO6 source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699853882.00000000047C5000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004D8E1C FindFirstFileW,FindClose,wcslen,FindFirstFileA,FindClose,GetFileAttributesA,GetFileAttributesA,0_2_004D8E1C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136Jump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\Local\Temp\.installbuilderJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0047433C SendMessageA,recv,SendMessageA,WSAGetLastError,0_2_0047433C
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701140434.000000000418B000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948175140.000000000416E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blogs.msdn.com/oldnewthing/archive/2003/08/21/54675.aspx
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948175140.000000000416E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.fedoraproject.org/en-US/Fedora/13/html/SELinux_FAQ/index.html#id3037154
Source: BR2817.tmp.0.drString found in binary or memory: http://gcc.gnu.org/bugs.html):
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701986821.0000000004762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tcl.sf.net
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948615170.000000000425D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timestamp.apple.com/ts01
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948462230.000000000421B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google.com
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1702209513.0000000003FFE000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701287991.0000000003FFD000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2947923259.0000000003FF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.inria.fr/koala/colas/mouse-wheel-scroll/
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1702301106.0000000002BAB000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676763557.0000000002BA2000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2943438473.0000000002B79000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002B97000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699823022.0000000002BAA000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1670620147.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1676432287.0000000002B8E000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699657096.0000000002BA5000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699582696.0000000002BA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00394D28 GetClipboardOwner,OpenClipboard,EmptyClipboard,CloseClipboard,0_2_00394D28
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003E4BC4 GetSystemMetrics,GetAsyncKeyState,TrackPopupMenu,GetCursorPos,GetAsyncKeyState,0_2_003E4BC4
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003A00600_2_003A0060
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003BC1780_2_003BC178
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0042047C0_2_0042047C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_005387840_2_00538784
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004C89100_2_004C8910
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004B49280_2_004B4928
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004C0A840_2_004C0A84
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004E8BB00_2_004E8BB0
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004B8E600_2_004B8E60
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00418E980_2_00418E98
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004BD1780_2_004BD178
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003E51640_2_003E5164
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00496CC50_2_00496CC5
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003C54580_2_003C5458
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_005315180_2_00531518
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004C163C0_2_004C163C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004857200_2_00485720
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0053573C0_2_0053573C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004C973C0_2_004C973C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004F17E40_2_004F17E4
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004498740_2_00449874
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00539AC40_2_00539AC4
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00421A980_2_00421A98
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00409B740_2_00409B74
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004C9CAC0_2_004C9CAC
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004CDD3C0_2_004CDD3C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00531DCC0_2_00531DCC
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00535E480_2_00535E48
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: String function: 00468DF4 appears 130 times
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: String function: 004417B8 appears 150 times
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: String function: 0053A3E0 appears 67 times
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: String function: 003F2E2C appears 34 times
Source: BR2817.tmp.0.drStatic PE information: Number of sections : 11 > 10
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: Number of sections : 11 > 10
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000000.1670308404.00000000005F4000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesetup.exeT vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948615170.000000000425D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: windowsResourceOriginalFilename vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701706477.0000000004551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ::maui::changeExecutableResources::windowsResourceOriginalFilename vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701706477.0000000004551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C::maui::changeExecutableResources::windowsResourceOriginalFilename8 vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701706477.0000000004551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: changeExecutableResources::windowsResourceOriginalFilename vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701706477.0000000004551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: maui::changeExecutableResources::windowsResourceOriginalFilename vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: windowsResourceOriginalFilename vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exeBinary or memory string: OriginalFilenamesetup.exeT vs microPHAZIR_5.4.0.135-windows-installer.exe
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: sus36.winEXE@1/29@0/0
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003CDAAC CreateBitmap,GetDC,CreateDIBSection,ReleaseDC,GetLastError,FormatMessageA,MessageBoxA,LocalFree,0_2_003CDAAC
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8Jump to behavior
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -start
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -startline must be less than or equal to -endline
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -startline
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: full-stop
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -startline must be less than or equal to -endline
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: E-activebackgroundactiveBackgroundForegroundSystemButtonFaceBlack-activereliefactiveReliefReliefraised-backgroundbackgroundBackgroundWhite-bdborderWidth-bg-borderwidthBorderWidth0-commandcommandCommand-cursorcursorCursor-elementborderwidthelementBorderWidth-1-highlightbackgroundhighlightBackgroundHighlightBackground-highlightcolorhighlightColorHighlightColorSystemWindowFrame-highlightthicknesshighlightThicknessHighlightThickness-jumpjumpJump-orientorientOrientvertical-reliefreliefsunken-repeatdelayrepeatDelayRepeatDelay300-repeatintervalrepeatIntervalRepeatInterval100-takefocustakeFocusTakeFocus-troughcolortroughColorSystemScrollbar-widthwidthWidth100Reached end of text in a matchTextFetchSelection couldn't find end of rangeseeinsertmarksetdeleteModified currenttexttagontagoffimagewindowSelectionoption ?arg arg ...?optionindex1 ?index2 ...?index chars ?tagList chars tagList ...?" is not at a positive distancetab stop "tab alignment-startline must be less than or equal to -endline
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -startline
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: aFbyteindexforwbytesbackbytes %d-autoseparatorsautoSeparatorsAutoSeparators1-backgroundbackgroundBackgroundSystemWindowWhite-bd-borderwidth-bg-blockcursorblockCursorBlockCursorborderWidthBorderWidth-cursorcursorCursorxterm-endline-exportselectionexportSelectionExportSelection-fgforeground-foreground-fontfontFontTkFixedFontForegroundSystemWindowText-heightheightHeight24-highlightbackgroundhighlightBackgroundHighlightBackgroundSystemButtonFace-highlightcolorhighlightColorHighlightColorSystemWindowFrame-highlightthicknesshighlightThicknessHighlightThickness-inactiveselectbackgroundinactiveSelectBackgroundBlack-insertbackgroundinsertBackground-insertborderwidthinsertBorderWidth-insertofftimeinsertOffTimeOffTime300-insertontimeinsertOnTimeOnTime600-insertwidthinsertWidthInsertWidth2-maxundomaxUndoMaxUndo-padxpadXPad-padypadY-reliefreliefReliefsunken-selectbackgroundselectBackgroundSystemHighlight-selectborderwidthselectBorderWidth-selectforegroundselectForegroundSystemHighlightText-setgridsetGridSetGrid-spacing1spacing1Spacing-spacing2spacing2-spacing3spacing3-startline-statestateStatenormal-tabstabsTabs-tabstyletabStyleTabStyletabular-takefocustakeFocusTakeFocus-undoundoUndo-widthwidthWidth80-wrapwrapWrapchar-xscrollcommandxScrollCommandScrollCommand-yscrollcommandyScrollCommand
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -start
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: -activedash-activefill-activeoutline-activeoutlinestipple-activestipple-activewidth0.0-dash-dashoffset0-disableddash-disabledfill-disabledoutline-disabledoutlinestipple-disabledstipple-disabledwidth-extent90-fill-offset0,0-outlineblack-outlineoffset-outlinestipple-start-state-stipple-style-tags-width1.0
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: b-all-ascii-decreasing-dictionary-exact-glob-increasing-index-inline-integer-nocase-not-real-regexp-sorted-start-subindices-command-indices-unique
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: ("%.*s%s" arm line %d)-all-about-indices-inline-expanded-line-linestop-lineanchor-start---encodingbytelengthcompareequalfirstindexislastlengthmapmatchrangerepeatreplacereversetolowertouppertotitletrimtrimlefttrimrightwordendwordstart
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: full-stop
Source: microPHAZIR_5.4.0.135-windows-installer.exeString found in binary or memory: X[:digit:][:space:][:alnum:]_[[:digit:]][^[:digit:]][[:space:]][^[:space:]][[:alnum:]_][^[:alnum:]_]alertESCSOHSTXETXEOTENQACKBELalertBSbackspaceHTtabLFnewlineVTvertical-tabFFform-feedCRcarriage-returnSOSIDLEDC1DC2DC3DC4NAKSYNETBCANEMSUBESCIS4FSIS3GSIS2RSIS1USspaceexclamation-markquotation-marknumber-signdollar-signpercent-signampersandapostropheleft-parenthesisright-parenthesisasteriskplus-signcommahyphenhyphen-minusperiodfull-stopslashsoliduszeroonetwothreefourfivesixseveneightninecolonsemicolonless-than-signequals-signgreater-than-signquestion-markcommercial-atleft-square-bracketbackslashreverse-solidusright-square-bracketcircumflexcircumflex-accentunderscorelow-linegrave-accentleft-braceleft-curly-bracketvertical-lineright-braceright-curly-brackettildeDEL|
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile read: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wintab32.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: certificate valid
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic file information: File size 29187584 > 1048576
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1e1e00
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
Source: Binary string: Agent/work/bd24ebda5aee1e55/WebserviceHandler/bin/Release/WebserviceHandlerDLL.pdbFR,mO6 source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699853882.00000000047C5000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003789E4 SHGetFileInfo,SetLayeredWindowAttributes,LoadCursorA,LoadIconA,LoadLibraryA,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_003789E4
Source: microPHAZIR_5.4.0.135-windows-installer.exeStatic PE information: section name: .eh_fram
Source: BR2817.tmp.0.drStatic PE information: section name: .qtmetad
Source: BR2817.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR1D20.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR1DCE.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR1E2C.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR1E4D.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR1E9D.tmp.0.drStatic PE information: section name: /4
Source: BR24D9.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR24E9.tmp.0.drStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0046CAD0 push eax; mov dword ptr [esp], ebp0_2_0046CC83
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0046CCA0 push eax; mov dword ptr [esp], edi0_2_0046CDBA
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00458DDC push ecx; mov dword ptr [esp], 00000000h0_2_00458E02
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00458DDC push edx; mov dword ptr [esp], eax0_2_00458E0F
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004D73EC push ebp; mov dword ptr [esp], 00000002h0_2_004D77C2
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003C8068 push ecx; mov dword ptr [esp], esi0_2_003C83D7
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003E41AC push ecx; mov dword ptr [esp], edi0_2_003E4372
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004D83A8 push eax; mov dword ptr [esp], ebx0_2_004D84C1
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0052842C push ecx; mov dword ptr [esp], eax0_2_00528431
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0046C844 push ecx; mov dword ptr [esp], 005EC084h0_2_0046C88B
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003DC800 push ebx; mov dword ptr [esp], esi0_2_003DC854
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00474C44 push eax; mov dword ptr [esp], 00585694h0_2_00474CB5
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004DD194 push eax; mov dword ptr [esp], 005EC9C0h0_2_004DD22C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004DD26C push eax; mov dword ptr [esp], 005EC9C0h0_2_004DD2A8
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003DD460 push ebx; mov dword ptr [esp], esi0_2_003DD658
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003DD460 push ebx; mov dword ptr [esp], esi0_2_003DD9DD
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003795A4 push eax; mov dword ptr [esp], ebx0_2_00379B88
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003D17E0 push edi; mov dword ptr [esp], ebx0_2_003D1C87
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00475EBC push eax; mov dword ptr [esp], 005EC364h0_2_00475F76
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E4D.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24E9.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR2817.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1DCE.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24D9.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E8C.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D20.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D5F.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E2C.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E9D.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1FE6.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004D83A8 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,strchr,FreeLibrary,FreeLibrary,GetPrivateProfileStringA,GetWindowsDirectoryW,GetWindowsDirectoryA,lstrlenW,0_2_004D83A8
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\installbuilder_installer.logJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00378408 IsIconic,IsZoomed,AdjustWindowRectEx,SendMessageA,SendMessageA,GetSystemMetrics,MoveWindow,GetWindowRect,GetClientRect,MoveWindow,DrawMenuBar,0_2_00378408
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E4D.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24E9.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR2817.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1DCE.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24D9.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E8C.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D5F.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D20.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E2C.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E9D.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1FE6.tmpJump to dropped file
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_004D8E1C FindFirstFileW,FindClose,wcslen,FindFirstFileA,FindClose,GetFileAttributesA,GetFileAttributesA,0_2_004D8E1C
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0049EC00 GetSystemInfo,VirtualQuery,0_2_0049EC00
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136Jump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\Local\Temp\.installbuilderJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2944521181.0000000003522000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware InstallBuilder ?
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Loodud VMware InstallBuilderi avatud l
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ]Luotu VMware InstallBuilderin kokeiluversiollaecifique un directorior.
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2944521181.0000000003522000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qErstellt mit einer Testversion des VMware InstallBuilders\nn
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ico VMware InstallBuilderjazli
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Creato con una licenza Open Source di VMware InstallBuilder per %1$s
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699675503.000000000412C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware InstallBuilder for Qt - Windows
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Erstellt mit einer Testversion des VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: a Open Source do VMware InstallBuilder para %1$sSelection.Select=Selecione o Java(tm) Runtime a usar
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: a Open Source do VMware InstallBuilder para %1$s
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701986821.0000000004762000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lappend Btvxo /Library/Java/JavaVirtualMachines/*/Home/bin/java /Library/Java/JavaVirtualMachines/*/*/Home/bin/java
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wersji demonstracyjnej programu VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: licencji Open Source programu VMware InstallBuilder dla %1$s
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948615170.000000000425D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tip {Only available for Windows installers; if enabled, it will use %LOCALAPPDATA%\VMware\Temporary for temporary files}
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2943194039.0000000000EE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: o do programa VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Installer.OpenSourceVersion.Text=Loodud VMware InstallBuilderi avatud l
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ico VMware InstallBuilderjaeden za
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rderingsversion av VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Creato con una versione di valutazione di VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Created with an evaluation version of VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Erstellt mit einer Open Source Lizenz von VMware InstallBuilder f
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701905774.00000000051A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if {[string match *BITROCKOEM* [$licenseInfo cget -organization]] || [string match *VMWAREOEM* [$licenseInfo cget -organization]]} {
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wCreated with an evaluation version of VMware InstallBuilder
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rderingsversion av VMware InstallBuilderenden f
Source: BR2817.tmp.0.drBinary or memory string: 21QEmulationPaintEngine
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ico VMware InstallBuilderja
Source: microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1699767126.00000000058B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Luotu VMware InstallBuilderin kokeiluversiolla
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeAPI call chain: ExitProcess graph end nodegraph_0-83179
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003789E4 SHGetFileInfo,SetLayeredWindowAttributes,LoadCursorA,LoadIconA,LoadLibraryA,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_003789E4
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00470168 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_00470168
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00361000 SetUnhandledExceptionFilter,__getmainargs,_iob,_setmode,_setmode,_setmode,__p__fmode,__p__environ,_cexit,ExitProcess,signal,signal,signal,signal,signal,signal,0_2_00361000
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: InitCommonControlsEx,RegisterClassA,GetKeyboardLayout,GetLocaleInfoA,TranslateCharsetInfo,0_2_00394390
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\wmImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\wmImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\logoImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\logoImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\leftImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\leftImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\splashImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\splashImage.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\open_directory-16px.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\.installbuilder\.tmp_7640_9228136\open_directory-16px.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation BiasJump to behavior
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_0046C2C0 getenv,strspn,GetTimeZoneInformation,0_2_0046C2C0
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_003D4198 _strnicmp,_stricmp,GetSysColor,GetVersion,0_2_003D4198
Source: C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exeCode function: 0_2_00474644 socket,SetHandleInformation,bind,connect,ioctlsocket,SendMessageA,WSAGetLastError,closesocket,ioctlsocket,bind,listen,WSAGetLastError,0_2_00474644
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
11
Input Capture
11
System Time Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
Obfuscated Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
microPHAZIR_5.4.0.135-windows-installer.exe0%ReversingLabs
microPHAZIR_5.4.0.135-windows-installer.exe0%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D20.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D20.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D5F.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D5F.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1DCE.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1DCE.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E2C.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E2C.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E4D.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E4D.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E8C.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E8C.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E9D.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1E9D.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1FE6.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1FE6.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24D9.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24D9.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24E9.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR24E9.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR2817.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR2817.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.google.com100%URL Reputationmalware
http://tcl.sf.net0%VirustotalBrowse
http://www.inria.fr/koala/colas/mouse-wheel-scroll/0%VirustotalBrowse
http://gcc.gnu.org/bugs.html):0%VirustotalBrowse
http://blogs.msdn.com/oldnewthing/archive/2003/08/21/54675.aspx0%VirustotalBrowse
http://docs.fedoraproject.org/en-US/Fedora/13/html/SELinux_FAQ/index.html#id30371540%VirustotalBrowse
http://tcl.sf.net0%Avira URL Cloudsafe
http://gcc.gnu.org/bugs.html):0%Avira URL Cloudsafe
http://docs.fedoraproject.org/en-US/Fedora/13/html/SELinux_FAQ/index.html#id30371540%Avira URL Cloudsafe
http://blogs.msdn.com/oldnewthing/archive/2003/08/21/54675.aspx0%Avira URL Cloudsafe
http://www.inria.fr/koala/colas/mouse-wheel-scroll/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://tcl.sf.netmicroPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701986821.0000000004762000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.google.commicroPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948462230.000000000421B000.00000004.00000020.00020000.00000000.sdmptrue
  • URL Reputation: malware
unknown
http://www.inria.fr/koala/colas/mouse-wheel-scroll/microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1702209513.0000000003FFE000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701287991.0000000003FFD000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2947923259.0000000003FF8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://docs.fedoraproject.org/en-US/Fedora/13/html/SELinux_FAQ/index.html#id3037154microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948175140.000000000416E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://blogs.msdn.com/oldnewthing/archive/2003/08/21/54675.aspxmicroPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000003.1701140434.000000000418B000.00000004.00000020.00020000.00000000.sdmp, microPHAZIR_5.4.0.135-windows-installer.exe, 00000000.00000002.2948175140.000000000416E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://gcc.gnu.org/bugs.html):BR2817.tmp.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447782
Start date and time:2024-05-27 02:48:33 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 0s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:microPHAZIR_5.4.0.135-windows-installer.exe
Detection:SUS
Classification:sus36.winEXE@1/29@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 53
  • Number of non-executed functions: 177
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
TimeTypeDescription
20:49:27API Interceptor28x Sleep call for process: microPHAZIR_5.4.0.135-windows-installer.exe modified
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D5F.tmphttps://downloads.lexmark.com/downloads/software/MVE/4.3.3/mveLexmark-windows-4.3.3.exeGet hashmaliciousUnknownBrowse
    ForcepointOneAgent.exeGet hashmaliciousUnknownBrowse
      ForcepointOneAgent.exeGet hashmaliciousUnknownBrowse
        https://dr-download.ti.com/software-development/software-programming-tool/MD-QeJBJLj8gq/8.3.0/uniflash_sl.8.3.0.4307.exeGet hashmaliciousUnknownBrowse
          zscaler-windows-gov-3.5.0.108.exeGet hashmaliciousUnknownBrowse
            zscaler-windows-gov-3.5.0.108.exeGet hashmaliciousUnknownBrowse
              uoMgG81hBq.exeGet hashmaliciousBabadedaBrowse
                n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                  n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                    Browser_renew.exeGet hashmaliciousBabadedaBrowse
                      C:\Users\user\AppData\Local\Temp\BRL00001dd8\BR1D20.tmphttps://downloads.lexmark.com/downloads/software/MVE/4.3.3/mveLexmark-windows-4.3.3.exeGet hashmaliciousUnknownBrowse
                        ForcepointOneAgent.exeGet hashmaliciousUnknownBrowse
                          ForcepointOneAgent.exeGet hashmaliciousUnknownBrowse
                            zscaler-windows-gov-3.5.0.108.exeGet hashmaliciousUnknownBrowse
                              zscaler-windows-gov-3.5.0.108.exeGet hashmaliciousUnknownBrowse
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):270
                                Entropy (8bit):6.717335914223344
                                Encrypted:false
                                SSDEEP:6:6v/lhPahm7LyIKTVCMHYiadykFWFETyPbx0/TbGZHtVp:6v/7dyIKT4MHYianWFcyj6Ut7
                                MD5:0C9DE7257B7EE7379BAAAF1BDDD14932
                                SHA1:029542B54CF11999C097A43BE246DA556BD5545E
                                SHA-256:A84004F3B828D76474FD2099421606FBDAFC3BD368BFA75A418D7371AE9CA054
                                SHA-512:F29C23622E7526392297380DEDB0BC2E61246455C51DADABEE077AE18CFEFD194C2FA2A9744E6D0E3136AEB7107DE7037EC0760299C760FE45CC1196480E01FB
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR................a....pHYs..........+......IDAT8..1..@.E..7..N;.B..D....ho.tj@..6v.....B"1$......0...cH.....i..ADn..s... ..PUz.9....k.y~......X.m...1.....E.s.=.L7..$I@r]U...v.A.EH.[.|..H2......TU....3X.....M?..<a.@DNY...s......P...S.C.....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):214
                                Entropy (8bit):6.321269906051765
                                Encrypted:false
                                SSDEEP:6:6v/lhPahmGz2gfZf8x5f9ajjrqmL19d+oMZNbp:6v/7szBQf9ajjrqm59dFMv1
                                MD5:3F405C02903E08A83E14226289E9ABF3
                                SHA1:596F4CB37A4A5D2629693A4F6A4F98555245E124
                                SHA-256:B9DF657E61647E06983DB4864213277FAA4BD7E5621755874EB4A7568712232F
                                SHA-512:40FDF6B1C740DB35EB47791826221EFDF7D962A23FE751C3F0BD0D023FEFB959449AD46D5B5C3BEC24377CA5ED2939F17264180534ECF92DD3C9166149814019
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR................a....pHYs..........+......IDAT8.c...?.%.."....,.Me...3.G....S...obzY....|..<...o,.....d``(.g.cEE._...&R.........)...;..1000...?.@.......Tq........R&..nr4......'t...(....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 163 x 314, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):74138
                                Entropy (8bit):7.993130768869208
                                Encrypted:true
                                SSDEEP:1536:8C3RVnDOnAnnfr/n1asp7TMwbAzPtH2vCLe0LpDmrB/Of:8C3RUn2j/gsp7TMCAzPtH2vCLek3
                                MD5:72209439BF95DBD15E133C0240F6CA87
                                SHA1:3BDE6093B65C70CC755C6F58F3D52DCCC039B5BB
                                SHA-256:431146803BE14A86488227A08C457783D9B1649A0D10E9BBEE286EFBBA04889D
                                SHA-512:B0BBFCC3E7FC4E0B7BECD2728AD93090ACA070D78E3CEAAB09B2A5976DBE76F02CE4A6291E1D8358387BFD06C334A1FC11AEF4306C09796DA37DDC23DD308495
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR.......:.......u.....sRGB.........gAMA......a.....pHYs..........o.d....tEXtSoftware.Paint.NET v3.5.100.r.....IDATx^....T......H..........Cpw.[......i.....i<99.....JC.s...w.5..U]]....9..ir...u......^Af..f.....M.,...G1.|.-.Bm.......}..o.M`.3..'...~a.aqv!1......V.....8._.r.dnw....s..W.[....Wm.z...[./..}h..bf.....'..0.!8..7..;../..'..+..3..;.o.}@..D..$nl.b.C`<.......]"..Cbm."..t..w.J.M...5u.......[....M].i......?z..E3.....=..c..Ll.#........E8......{...,.,.._$....\y.?q...a..M...~......,/7,.}h....&,.....w.;;.^.s..O..|..s.v_.....G.....E..N..g..NC...9.....^..S.......~.A<..W07.....B....y....A.& d...y..SX"..c0]..T...3...xS=.w.@...%..U<.S.....7.......Go<....n.q...9..za...*LH&../A.!8.94.8.....Q..Wo.N)...b...p.0......|3...w..............^.s....3..fk.'.gs.[x.Yy...C ;,....h6..o..N.f.X../...C.yG.,..;8.5a.>.s........%...m{7...>v............NB......xM...{...}.AS..|...{..Om...C.6sfC3.....p.O`.s..6..R}X..[.+......}..6.../..Z..P.B.P.lg..)2..
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):5247
                                Entropy (8bit):7.938595101530738
                                Encrypted:false
                                SSDEEP:96:dfye/lhgXs2SsrixKTTryHjXrs3bojZKUXEcENawWF/XOD:d3fks2axKXyXw3boEgS
                                MD5:023869ABDE485B660B6C1E7B4FF96644
                                SHA1:36EB18CE45FE4651328405A2156FE92ED3A21C42
                                SHA-256:DC15CAD7FBF3667AB33F0B07FC5F08B778009389A0DDBEC4C52B31BB4F3E51E6
                                SHA-512:916C1E10A9B1B38D3C9848428ABB4912398637313B46A53B0A7F13E0065D35C7D145E0A5D26D48F971252E58060EDF23EB315A71B9E9627C1F88FCFE6C5B4CE6
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR...@...@......iq....FIDATx..wX.g..sw..l6.&Y.q7.5..20Lo....CGz.f.u.f..D..^..""b..;.X#1.&.l6..5......K...g7...cQ..9....|..i...g.......sssKgg...>u\....4.7.........lgg./...i.u..o..g..rrrZ... .......r@....V.{;E..ejb.......vU\..i.EE.655e.........R....zj................@..q?]....).a.6.n.6....e]...8..T?..T_PWW...L... <.+--.8#=5?%9.L.*..Tm....@}y14T.Bcm..55@wg..@....../..{Outw.....t....ST....^.....J.........E..n..WVZ.C..0~..LN..K....p......g.~..._...|...}....7666S&..q.\....._?5.j++.U.e..U._...<.........F......sp..8.<x.v...Nhjn....y\T\x+11.PxxxyB.J......k...K...<......%.....<..k....t.8.8..::;.......A....11..BXh(DFD.J.Z.&i....}........c...5...^...........d.o.Q........3.wl..Z. '7..S..3..l.zA"S.U[....^.......+............T...15....7.noo.:*.'.@AA..h[.pK...O.<:{..a......TP..!(..l....NO..G...kz...).W.-..C..F...........s....$....u.n445t..."..X.EEy......../.......{.......(.0.....v`.....+...g....?...2...2......x.B.../.M1..2...c.m...VK
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):847
                                Entropy (8bit):7.644219330444528
                                Encrypted:false
                                SSDEEP:24:2q9dbueKJexMQaSXTt7xS3cMqke1UOgyQ:2q9dbu+7Z7g3cMnZN
                                MD5:73C2B582D5A8861DD8E7DC75CF91AEF9
                                SHA1:203FDCDD747CC187A3D108119F46C5575172B630
                                SHA-256:9CC4F7C9F01BC56BABB9A4AD7C13CC382391B84F1E8454AF32BDC6375B9514AD
                                SHA-512:0580C316AA6DD633F66815189C923957B556B04DE50E985D52046C0472432401B0CA338D1059DF5AEC125B8C3C3ACEFD3A9AB8B10EBDF2289189F0F6DC6BD752
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR... ... .....szz.....pHYs..........+......IDATX..OH.Q..?S...%....aE.%...A&..B.QF......SBE..BQP..$P.i...B......C..t..Z[u:L#.;ovgw....7..g~.....i...ZQ.T.B.@.....J."......@..-..._#.....|..p.X..9........ .......|..k.h.R.O. ........0w...,.Z.....N.m..........e..`.......G.Q.N.......<.3.Y.a@..._`...0>........."..2.hT. .b..9..n.>..n....K......7`......a...BH..........t.U.KW..@..v.;!....*g1.[..*..f.8.`..6.I.........A..(.z.j2R_.en.,.8#..(.jede. t...`a.g.*. _H....H...Qm$R4...g.....Z..Q..h....V......i.3.....pM..~..iN.0.u.zJ7.c...@,`.......T.G.*...:U..B*m...F............'@.0.c......e...1=4.3...|.?..3.V.'.PX]...}bzh...-^...R.D...1`.....,F.x..FV6....T...x...h..z....B...^..#.i....B*.....r.2.L..*.9$NJ..2..L......j...{.V.6.1.7O..\.R.&.....R.......;|&0...=..u.pF.q09X.F.V.9)...rG..,.V.v....U.04....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):721
                                Entropy (8bit):7.49760654355309
                                Encrypted:false
                                SSDEEP:12:6v/7iYHtJ9fB96qMazUQWM6/kYX4MbUN/14b0LOP5iSWHTqaftMQt/vxfo8c:2NPf/qZhM6/rbSS+OxiSWNfTFvc
                                MD5:CEBC342673CC5E217888E0E2B044C36E
                                SHA1:A442CD21CF79B81BDA1E34417001AAD3B9962F10
                                SHA-256:4766392D05255CFCCA82D9A6DD5CDDC5ADED6EE0B937C1CF28CB2A48935BFBAC
                                SHA-512:DC53B86C8BB2597DFD0E5FEFA14B106E5C81F41B25D0AA0F1FD39E4BA59EF9F76356F48750DA5075D9E1C54FDB43DCBDBF61B9C055755ECC9EEC059D6C093B55
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR... ... .....szz.....pHYs..........+......IDATX..=h.A....1..P".5..Q...TQ.........XX.:....R...v.R...i.)....J.......h....$.......V;3;..0...7^.\...%.D.L+...Y-.....P............@...f.i....e..c.u.5A."....Z~...P..0.d.....x..[-#MB..2......8.i...r=l0*.'*....r.....*..B.W..Pf(l%v..e...q....d....<..{.r..c!..t<.@(s.......o..v[.).cB.WV.....(..R.......z.3,-.2........y..v..e.._.=I..T.8a..ou.W.RZ.f..b......ca.....stu.}I(S..(...D....?....d.2Y...6.P...&_P{...V.Pf...4B.....`.8.....0........~...B..f..?...)...H.2.x..`.\..L..u.xk.|....G.e....E@.;...Z~......0a...vF.d.qEh.....Zn...J..@3........!.*.,L...".Q.......X..H.....]D..n..*.X......p.-...q.=e..K... .....:q{...o\..Z*..V...3..q.......IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):1033
                                Entropy (8bit):7.698477323002819
                                Encrypted:false
                                SSDEEP:24:2IR9HRj4pSIXuua2K5phWNkKsw06UBnuMehb5pk1c7:2I3uTuuWxWNi1EFl
                                MD5:FFD20724A28CD8A5A60D4D25CFD02C1B
                                SHA1:E535223FA5CEB762CB45FD8A0832AAE38537D940
                                SHA-256:A329CC9374484B61477797BF6D2435F26EEB1EA372301C893441260E6E0E120F
                                SHA-512:BE57EBDC948D4416B7A9A2ACB34C162B717329BE4BD8A5E48CDDD95858D524A1F5980C6C059380D099A5136DD100749B46AA663C600A2618EB3C42B9FF4D2DAE
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR... ... .....szz.....pHYs..........+......IDATX..[h.W.....Ml..Mj..h.L....>....ZO..AQ...Q...D..:.Rz..".>H...C..H.i.V1^.....F..d7kv.0q2...=I.|O..9...q..|.X..hZxT...jF.x...T...B....\...#.....U.}.U3..... *.3...jM].._..f..|..H.{...n..........PF ..5...J........P....U*b.......[..il...GA..........T.X...r..W.1.u....|U.^ngg..<.'.7....g..T.x...L.N\?o.kk...,..~r#!r......U....x........_z...?.XI...Ns.c.......NP0&Lu.k.'f....+)d.R....M..|....P5....(.FnXP.....w.X...Vj....]i{..='.i.R@..........J.u........../G....{_-.v..T.E}x.w...S;..n0.N..Q.].A..j....".~.......~~......`....#....)*...>..K....'...N~h.X..+k...`.....T:..[....%..g..C...c.nRV.+b....M...5.Lf......70N.`.).r.b...v.5....~...YfL*v....Y6..........r.,E....,....?.....G.k ...........{....8.v...>`.L...A;..........XJ....+..d...Q=..z..[...\n..E.....o3eR..M.".4}e..TF.....f...L..E..^r#!R.E<.\......7.......2K..`....i........n&.k....h.".4I....x.........&f.p.L..T5.t ..N.._...NK...x`".+.7h..
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):1055
                                Entropy (8bit):7.738070756089916
                                Encrypted:false
                                SSDEEP:24:2kyK4gNHEo+Ko2xc7UZ6DReOv8wujMsMJyeKn708/yEObG027:2PaHE3B2xcoZeRe+8fjMsIyb7qCj
                                MD5:764B5A5CE7ACFA5FC2BFE24FAC69943B
                                SHA1:E046BE09BBFB2B29F198CEBF782CB92821B95353
                                SHA-256:21A072DDCA6B172848B1707E533625249F6DF53C79F2969D0DA6AB40113D414E
                                SHA-512:7D527D419CD400300929060DAE346FAB4AC851B1E5EBECAFA054D4DE1DF7DBCDA12C8577B22FF61749C5D79589275D8FEBC76BD18AF3034A9D7BA78D3587ABD8
                                Malicious:false
                                Preview:.PNG........IHDR... ... .....szz.....pHYs..........+......IDATX..;l.U...sg_...B.c..H.a...BC.......)..D.RP.....@.....D..c..qo.......E2Z/q....9.R...... .....s..?....k-.'b....w-..k..ZCzu .u...4...d........rMWE...Z.1.OL....VO#(Uu.].E..._.......t...ZS}...b'.'..Q.Ev...5#.....,..H.....Xy.M..|..G3.akFs..j~.xs$F...M ......c...Z....&...W}noWi..W.f..0uC;`.s.(..L....~.}.Ux.!>zk...*"..\ ..P...cd...#...gg...D-....+..X/.\P.k#.o.[..l.;3d..}AG.8}...J.>8.C.'6...OL.....N...w.....T5..ow-....u.q..;../..8..*&iP,($..T..@...{vx.[.@..K...X.O....L._...t.#.SG../...\.{....+>..D....%!....q$...I.g.?a(.}.H$L.2......@...:..e... bH9..G......f(.F..\...!x.*.Tl.\.4jv'......Ue......Y8.".F.]..x......f....B..G...)..W......{o....G)..t.9f...\....@.T..v....>/?3.._?....].7sku...Z...w..>S..r."M%...I.._.+..k]... b...~.=.Tj..M...7.d.V.,.....+.B.h,..h.Y..r...yU>.! x.>z.y.3...X.+...E6....s..0...W......|_..<.N.>..T#..".....X~~.R...V...[.F..T.....O]...[...{[K:....~......}.8.J..p.we#...4wA<..
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):603
                                Entropy (8bit):7.528183753908817
                                Encrypted:false
                                SSDEEP:12:6v/7+8Tpys/scSs5XAcB3XTPho1eih40QS4GnihAJCFTV:Z8Tpy+Ss6cB3W1eih4R+gFJ
                                MD5:CB7FC2C78B9403F999A4A050C2110BED
                                SHA1:43CB3469A2B48448DFB56CF08FEA90BDFFD5CA1C
                                SHA-256:A7FE76AD71E8884D3D5CB37A34EA29030D0890CF2E2FEC84CE46AE5C2884428E
                                SHA-512:6CE564D0BEFC5FAE8DBE225D8CC1520920B4C0CF098BA70C86D3A5491E82E5D4547EF247ACB0066142A5C5293F4D9F70A72E5105267157908434E51D3730DED1
                                Malicious:false
                                Preview:.PNG........IHDR................a....pHYs..........+......IDAT8...MHTQ.....;..(.$....h.dBH%m.T.....\5..D..$pvM0ie.!..0...."A.Y.AM.Bl..q.....1M_tv....._..........^....v.m..`..v3....+9.{.|[z....6:+........t>...e.9..nk)..y.fsGuz.]........G....iaf!..g...s...'G...H...R......y.ef!..u..L.sl.>......>.[=1..y..C.R..T.......'..'#}.j.u).......O"F$...%s.=....v[I.RJ.Wsi ........k.p...,.....FXZ5n.D....|.>.?5..?5V..U.......D......*.Nj$..:......T.....&qc......d.....\.r...n.HS......ZD$.%Y.1..T.............kI:!.R...`B+..2oC6...T\..xW.%....Gr.x..,y...*....ED.*....dS..o..b.........IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, interlaced
                                Category:dropped
                                Size (bytes):626
                                Entropy (8bit):7.4544612269881405
                                Encrypted:false
                                SSDEEP:12:6v/72L6CGtUk37vZtBNoa5qOwQr2zluYSrOvk4sfQ82EUJuZTu4r7ijPq7:RL6tjf5EQyzndsoEUuZT+O7
                                MD5:1AD7F4E14ED0020A785EC44DB1704026
                                SHA1:C82FA818E6F1041BBCBB8C6F938663511DFFA6C6
                                SHA-256:0C527247D1314056B8CA0E984C52E0BABD74F7E05543FCEE8EE0038A778001FF
                                SHA-512:86F7C8109F4BBE997113CF5666C13E043C74D4B3214F1702760B9677A3CFCC11471C26F961E32E77956A42D200E6BC86E2054782F34BF8298B96B88F0AD50476
                                Malicious:false
                                Preview:.PNG........IHDR.............h.......gAMA....1._...)IDAT8...1kTA....f.0f%...Z<.U........B......... ....6..B......$......Z.n.-B....h..Os.....3......,(.>..M.......s.........1.. .rF..,.Y.]......D.......@...._.Hyff&....l.{.W..8>...\/$?G.....o.....977.pE.sazz.......@......8..(.E..+.8t.e.@).Hk.4.s..9....z4.o.7.4...........V..v........V.R...[.. .!tG."rV.ND..$I..^.K.c`+......"...,....<!........&&&...@....z.Xkw.9...qb.E.D.R.y.^g8.....!P.V.t:.K.qd.<....{Z.......iJ.\..-F.c..J.r....1.c....4M1..B8..;4.9..O.R....d.8.._.e0...!..vp...."."I.W..E.A.$C....).....>h`_).V)....q.@C..r.T:.\(....q.w.Z..."f.y.+......IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, interlaced
                                Category:dropped
                                Size (bytes):694
                                Entropy (8bit):7.623892941734491
                                Encrypted:false
                                SSDEEP:12:6v/72L6CGdYgaxy07uGbT7n9jWY2zZjKi/VSqw9N5m1wPTnL6acsjij2LkVAoDwz:RL6dYgaU07uGbH9jt2BPBwruInL6aja8
                                MD5:1890CA99E2D148C17238514110371870
                                SHA1:4F3B1C8EC4B7E33CBC48A7AF4753978E166F2002
                                SHA-256:EA12F9DB396D416DB16940A4503C3334DBB04CD7FFD8E7988E1AD811EFE7E279
                                SHA-512:63722E113D84ABD610438C6123AA826D7D9309DF9CFB55C44A8C7C3AAD3E028FFD0826053235EA730EEF0855C3BCA2638CDCD514520F0ECD0329F11FDDED6C30
                                Malicious:false
                                Preview:.PNG........IHDR.............h.......gAMA....1._...mIDAT8...;hTQ...9...Q\.....K.Q.".&...c...+........El..A...."....D.E.$..*....._.F..n..;....A.S...?3.....n..0.u..Sb..>r=..dD|....iq.H.......0)......0.....|~..x..u....................+7.M...... ..S/...6U..4....v..d4.lSU....t....2[Y.N.......P....L..b-.O;V..tL.....u......0.. ....`..3K..-W...^..=.gw..I....r.sN.y.....q..~....<d.].AzI....Z4k.;"z........E{..@..z9.X{]5.]...4S.......'.=/5.(..h....QP=.w......v:1i..o..Z..s.ULL~.....Ft4.2.~....D..T.s.x.U.5....m..y.l.v......9Y.T:....\..\...+@{6O.F"._......W.....-........x4..wV.}..,.....=.=......z.Y.P...Q.o*.?.3.nZ..:.]KZ...y&(.k.....\.<.(.23.......~.?`.........IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):338
                                Entropy (8bit):7.063027623097092
                                Encrypted:false
                                SSDEEP:6:6v/lhPahmEEZThHjmsfEodJSdJ0VGI9swOz1svlXqTsX8OYrBzkUjI6OwxaTp:6v/76ExxjmYS5bzaXqTsI+CI5D
                                MD5:1E3B8D8CA1447C069A9501C04B38539F
                                SHA1:9930DCA41D2A6D3B28C800A0CF66F6E0DB18DC22
                                SHA-256:F57832DB993A00E1583FAE40E1D638FCC44AC6B4CA4627FB27D8246CBF8CC57C
                                SHA-512:8B60C40F7915759B1CA47616E42CF01FCE094E42B9FBFDDE1C46D4B81C86D371692CAF461164FA8201FBAB9DB838DEE08E97C139BFD4B26A6D2521A66651DCAE
                                Malicious:false
                                Preview:.PNG........IHDR................a....pHYs..........+......IDAT8...!O.0....XT%...Q.....Kh2.G.b?.......'.A._q.N#..S..Cp#d..%...y.....U".6."..&...P....T.e.M.\..-..~q....U...Z+eY.$..pj...x..3_..V..s..I..<...57'...V5.yL..Lb..M..'...21.!_..AB.p.T= 8?.bC\...y..b......).....k..m+..u.XkED..@,.N.......w...h._.4......~..}.r....+H....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, interlaced
                                Category:dropped
                                Size (bytes):401
                                Entropy (8bit):7.119673694664037
                                Encrypted:false
                                SSDEEP:12:6v/72L6CG0qjt95LeKtz992EerdUKZp+/Fo:RL6Pj7tX2EeZrZpao
                                MD5:F98D1562A4D33166A9FF729FCFD0642A
                                SHA1:69526287A0F328195D5A0E2F2E8AA0C8BB27B8CC
                                SHA-256:9F06FB2D6124DDE3D0F0AB75CEEBCDAECC81F6C55CD9847B4FA10FD1C08547CE
                                SHA-512:253837C18A636EE025FA2DA7C0A3DD947A81944EBBDA6A9BBA51EA0B1F462262DE90F5FBD86C8CD48B68C823DFB1C451DA9B87871F8592AB0FBDB3778FC2A5C5
                                Malicious:false
                                Preview:.PNG........IHDR.............h.......gAMA....1._...HIDAT8...1N.1.E.C.W.`..P..R...p.. p..."....hSe......d..H. ..fE.x.....~......2p...U]M..@.!.Y.1..f........af..Wf.3.....sJ...DN)...2Qp.....).......wBF....`:..E....;..J..U....VD..v...".".e.......eh....@.w..P..i.|>?...{.1>.v.........p;./D....l6c..8W.W@..*..'......dD...Q....E..X...f......C..../....O.p...L../..r................c....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, interlaced
                                Category:dropped
                                Size (bytes):428
                                Entropy (8bit):7.322197065931019
                                Encrypted:false
                                SSDEEP:12:6v/72L6CG7akHIfNTku3uyEZADU08g4WerVHmE:RL67ufNYYNDX4WAVGE
                                MD5:5D60A0F5A76C53633FC551478CCEB564
                                SHA1:6A9406205C5AF62752E34231BBB2D9D8D20B3A83
                                SHA-256:8B70336D96C7382B272E74A9A0F346DA08D4C05836AC46E314E50145908FE4E5
                                SHA-512:66048CAA004E7F939C23D114E1D202EA4393B2E1CF20BE71CCB464403C4221E7D1A09D46A8A5132EEB24C92CB435861BA1FDDC8FEC6C38E37F5AD0B8B7E874F9
                                Malicious:false
                                Preview:.PNG........IHDR.............h.......gAMA....1._...cIDAT8...?N.0....]2.`...L.......>A{....'...n df.@...s6... ...jC.H.-......Y....E..,.(.......8.}...g.F.z..R....g.T'..a4H..>.7..*..T"X.H6\j..g...EU~%...Q.I.Ma..G..V..qv...TKu.x.}...g'Z......I."7..jB.m...A....Y.._...Z.....-..l6.^s....F....c..$...K.c~..:.q...x...M.3....0.p..y.^XT%Z*....[#.,..YX=.U._.<..q.....A.c.c.(..4]9........0.o..y.5~C..w.O....F.#.....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 149 x 73, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):10976
                                Entropy (8bit):7.978159308398723
                                Encrypted:false
                                SSDEEP:192:MBI2c8R6tM8kuofBvIuRf3lJ4753Esb93j7hQ+mkpkoM9bg4NW:Me2cDDr2vfLJIfb93jlnvWY
                                MD5:D91275826128D10EAE91FED6CDED3C93
                                SHA1:4F43C37475211F052032DE33705D88369E2C863E
                                SHA-256:176406FBF6662CB95C513026331F27E71756913E0D866172D293DF8096EA60BF
                                SHA-512:27557A14F528CF7EDDF6348E4115AA933C0C1E7D3EE36DFB8AC4544FFECB3208ED9A02210BA6FFF97E6C57CED5AAFDE86F472EFE419EE4207A1C838D2BD85799
                                Malicious:false
                                Preview:.PNG........IHDR.......I......<.L....sRGB.........gAMA......a.....pHYs..........o.d....tEXtSoftware.Paint.NET v3.5.100.r...*OIDATx^.{.t......bIn. Y.%.jW..;.Vu.0..JB ..i.....Z.-..O1....l.lYVw....?!.[..%....}..0N.I.._.f].{..>.......E.v......q....%...o..o.......8~.l.|.....q.....fK.....9.....x...S......V....k....x.....<...O........f..u....~]...?..i%...>.......=O9.M.=%.H...5.EBO....A.E.N\........%.%.....E...I;....i7......KO..O.>.!...#.9."a..c..'..!..G..E..Fug...E.>.5.A....s.*.)...&..b..@....b....A..R*:... ..6...vA....@..`. ..{..o........"..B.F....v..N.[p:...$;.`...../G... Y..N.Vt.....Z........A....X.oT....&K1f..5..)A$.2=.&.Gw...........$.\..._....7m;.3....1..tBrD1...v.+N..u.!yD.!.lbI!.g.E.Jh.k(........H0<...)..(f...`..F|.......m`(..93v<.....G.....*aD...i#........M$....Cj....8...vJ..Oq.!.}.mF..|.....>..G5c.I...-..].....g...hB...&.%..&C..V!!3.x.!..9W ....3..TB..`_..wpNb.g.K....,I(.....p:*7.Rf.Tz....<x.gY.+ssj.P.@c..Y.k..."q...|R....;.lz2l.+24).P....>wY
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 24 x 25, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):7.364096840660294
                                Encrypted:false
                                SSDEEP:12:6v/7Ly27alZjGRU2utzGcDu5rLE1GOmXj5DT78xK9YMTfETuyjCswLp/DFDEVfN:egZjGHiD4g4VDT7D5LECyjCjp/RAV
                                MD5:AB47FF2F11149DC3054E0EEC130DA697
                                SHA1:68E687D321DAF4728353141E3F02A852D75046A0
                                SHA-256:D78B891FEA51A5FF9C0852CE082605C94E05A019ACE8056ECAF90C561EC0FAE3
                                SHA-512:D9805A27C73719EE11B914F2A6AB2666F70953FD7A6C5AF5690E45D4E7E6DE66192EA22CB92A1C03729D9BACD4E2A320D9CB5A34F5523FA0A9FD2FE28693AF93
                                Malicious:false
                                Preview:.PNG........IHDR.............++.]....bKGD..............pHYs..........d_.....tIME.....!._.4N....IDATH..Mh.`...o.l...e..a"38A7...;.....N..F/..G..9^..x.......a.*...CD...e....".cv.....>..u`.!....{.....K..;.\."..\.R..........R.b-.e.l`U.26.A./mn..3..@.!.PJi......B...J....'...1+......s....~c{ .."a.dP.Q.........B...RN#..H..........r?....'....SC.....`7[.V..g....0.._k........4.H.qm8N...`/..q....s..\!6V>y.2..${..lc...\........)........V.`....:....k.7F.l-A:..a.s@..P....;Hg....G...r.X..z..Vt......s._..._~...!.;.].S..7_.}/.K......Zc...5TQM...\>..-.Y./...~....YQ.9.7.d..`..A.!...i."p..iQ.7.q...].}.i.H.2..r..D.Sz......D~..h..._..!"e.....IEND.B`.
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):5247
                                Entropy (8bit):7.938595101530738
                                Encrypted:false
                                SSDEEP:96:dfye/lhgXs2SsrixKTTryHjXrs3bojZKUXEcENawWF/XOD:d3fks2axKXyXw3boEgS
                                MD5:023869ABDE485B660B6C1E7B4FF96644
                                SHA1:36EB18CE45FE4651328405A2156FE92ED3A21C42
                                SHA-256:DC15CAD7FBF3667AB33F0B07FC5F08B778009389A0DDBEC4C52B31BB4F3E51E6
                                SHA-512:916C1E10A9B1B38D3C9848428ABB4912398637313B46A53B0A7F13E0065D35C7D145E0A5D26D48F971252E58060EDF23EB315A71B9E9627C1F88FCFE6C5B4CE6
                                Malicious:false
                                Preview:.PNG........IHDR...@...@......iq....FIDATx..wX.g..sw..l6.&Y.q7.5..20Lo....CGz.f.u.f..D..^..""b..;.X#1.&.l6..5......K...g7...cQ..9....|..i...g.......sssKgg...>u\....4.7.........lgg./...i.u..o..g..rrrZ... .......r@....V.{;E..ejb.......vU\..i.EE.655e.........R....zj................@..q?]....).a.6.n.6....e]...8..T?..T_PWW...L... <.+--.8#=5?%9.L.*..Tm....@}y14T.Bcm..55@wg..@....../..{Outw.....t....ST....^.....J.........E..n..WVZ.C..0~..LN..K....p......g.~..._...|...}....7666S&..q.\....._?5.j++.U.e..U._...<.........F......sp..8.<x.v...Nhjn....y\T\x+11.PxxxyB.J......k...K...<......%.....<..k....t.8.8..::;.......A....11..BXh(DFD.J.Z.&i....}........c...5...^...........d.o.Q........3.wl..Z. '7..S..3..l.zA"S.U[....^.......+............T...15....7.noo.:*.'.@AA..h[.pK...O.<:{..a......TP..!(..l....NO..G...kz...).W.-..C..F...........s....$....u.n445t..."..X.EEy......../.......{.......(.0.....v`.....+...g....?...2...2......x.B.../.M1..2...c.m...VK
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PNG image data, 85 x 85, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):8476
                                Entropy (8bit):7.964465594234627
                                Encrypted:false
                                SSDEEP:192:bErN0MSss9d0t5EUvd5M1X+9TGrApJTv5mt6a:bu09s42bv/YBwZra
                                MD5:0A8D4CF54EEF0FB6C4FAAF36DA45550A
                                SHA1:0FD063D6AF68810A358E16D88C9428DF2DC070FE
                                SHA-256:E8C90BFA75F9041BD35A3AC58B1F1394AFC75AF314D0B4F5AE5AD145F3F99DD1
                                SHA-512:008AF1030BFF7789C2B7382C2726564D847DE84DA70E1E171AF2ECF0686933BDE89D24E62404237AC626EA537EE24709EC05DA7E33233A99D35DE290DFED9BBB
                                Malicious:false
                                Preview:.PNG........IHDR...U...U.......?.....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..........+.... .IDATx^.|.w........._..W.`...}....X...snJ@a..r....w.s..H..........B.......7...oB~..m6..b1.9..O...d..}..l......?...d2..).V.Q..j.J.\,.s.|.P...|.X.T*.j..q.5..m.Z.f3.4M.....,K...h...R>.K$..x".Lg2.l..K.2x..M.......0.....$.cY.G...v/.C.|.. .86..n.$..m.Z.V*0T..s.L...7.tho.jl.%....(......S9n..0..CI.*.....}4.'.s<..S[.Z.n.........z..q.v....X*...c.^:..d....-...jq.#...q}A....G..8.....(.n...AO...M...1...k.....|f...|9.-.c:.f.:=...z..+...Fa.z..h@..a.N...q....Z.`..L..N......<b....sz\.8..s..q..\.@u....|.;R.nIf.5...MA..j.ec.XN..........s.\S..u.i.?..F#.......f.........n......b...@.t..fIIZ.\7..;..=.!Z9...."%.)5.=9..iw%=\73.U.li.L..e..t........0L.W...i:o..x...z.Y...V..z.F.[/...b.^..0..x.vM.R-3T5..Z .].....&?y,O.-..l..N.cce...b3_m7....e.#....rY%..6t..j8......f2IQ.....-.+p}.W..La...X....h..:..l..~_..3....0}....#.Z.....@[.....|/.Al..[..lM...l`...
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):44252
                                Entropy (8bit):5.164819922701245
                                Encrypted:false
                                SSDEEP:768:NkyXtmrxg+/7sL3p6ikKz2CsO3ewOiyJRfg/JQefSk2Hf:VXtqs7pOwFsRo/JQefSkGf
                                MD5:680365C3A3EA99A7B10CC9E23CEF1EDD
                                SHA1:5DE3F7B829323292E60585E5490E95D9510574D2
                                SHA-256:A0E0ED16AE5F37D864BCCD7B61B5795CD26782AB38E3AD963CA30BFBDAC95364
                                SHA-512:CF4C18AF2DB49A4B70C7E79F9E0FC2A3B9B796C012C45C7F2B10F73685C8091694B234109F8C75CF5450CBA193802B942638E8ED70357FC1EEB8B35666FA03D6
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Joe Sandbox View:
                                • Filename: , Detection: malicious, Browse
                                • Filename: ForcepointOneAgent.exe, Detection: malicious, Browse
                                • Filename: ForcepointOneAgent.exe, Detection: malicious, Browse
                                • Filename: zscaler-windows-gov-3.5.0.108.exe, Detection: malicious, Browse
                                • Filename: zscaler-windows-gov-3.5.0.108.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n5_.^..p.....&#.....2...Z......`........P.....b.................................y....@... .........................g.......L...................................................................................@................................text...`1.......2..................`.P`.data........P.......6..............@.`..rdata..p....`.......8..............@.0@.eh_fram8....p.......@..............@.0@.bss..................................0..edata..g............L..............@.0@.idata..L............N..............@.0..CRT.................V..............@.0..tls.... ............X..............@.0..reloc...............Z..............@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):295492
                                Entropy (8bit):6.638029569450762
                                Encrypted:false
                                SSDEEP:6144:yfmgpf/EQmPK6Yrzp2FaujGwkvmriOPNyh:af/ENPK/Fq8vJqNyh
                                MD5:122A3741699FB5C0950273245C9DEA15
                                SHA1:811F9149E3310A8E6521DA156F92F3AAAB012145
                                SHA-256:F675EBA3B22E0A2238EC4961D99DE3BACCA0AB553AB26EECB49800A12A9371AB
                                SHA-512:567C480F70FDC78769AE45BF83B6632F7AB380EBEB00689028D39FF03840C8B778149A3FAFE1DAB2AC77A1FD17A23B09F58774B1C5E791BFD33B99528225ECCC
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Joe Sandbox View:
                                • Filename: , Detection: malicious, Browse
                                • Filename: ForcepointOneAgent.exe, Detection: malicious, Browse
                                • Filename: ForcepointOneAgent.exe, Detection: malicious, Browse
                                • Filename: , Detection: malicious, Browse
                                • Filename: zscaler-windows-gov-3.5.0.108.exe, Detection: malicious, Browse
                                • Filename: zscaler-windows-gov-3.5.0.108.exe, Detection: malicious, Browse
                                • Filename: uoMgG81hBq.exe, Detection: malicious, Browse
                                • Filename: n7Vvc3eoSX.exe, Detection: malicious, Browse
                                • Filename: n7Vvc3eoSX.exe, Detection: malicious, Browse
                                • Filename: Browser_renew.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........'.@.I.@.I.@.I..G.B.I./.C.D.I./.M.B.I.@.I.I.I...Z.Y.I.".Z.L.I.@.H.?.I.....a.I.F.C.A.I.v.C.p.I...O.A.I...M.A.I.Rich@.I.........PE..L...PV.N...........!.........x......'........ ......................................zC...............................l.......,.......P..H....................`.. F...*............................................... ...............................text............................... ..`.rdata...W... ...X..................@..@.data................d..............@....rsrc...H....P.......2..............@..@.reloc..bK...`...L...6..............@..B........................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):36633
                                Entropy (8bit):5.172153856265245
                                Encrypted:false
                                SSDEEP:384:i760QouLg/TgeoyZQ82FXRivC4yPTyNeOnEOqjLtKjIUZuVnrufvS0QOwOP2H:pxR1u9CpKVZuFBNOeH
                                MD5:08AD4CD2A940379F1DCDBDB9884A1375
                                SHA1:C302B7589BA4F05C6429E7F89AD0CB84DD9DFBAC
                                SHA-256:78827E2B1EF0AAD4F8B1B42D0964064819AA22BFCD537EBAACB30D817EDC06D8
                                SHA-512:F37BD071994C31B361090A149999E8B2D4A7839F19EA63E1D4563AADA1371BE37F2BFCC474E24DE95FF77CA4124A39580C9F711E2FBE54265713AB76F631835A
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..../UM.R.........#.....2...N...............P....hf.......................................... ........................./.......x...............................<....................................................................................text....0.......2..................`.P`.data........P.......6..............@.`..rdata.......`.......8..............@.`@.eh_fram.....p.......B..............@.0..bss....T.............................@..edata../............D..............@.0@.idata..x............F..............@.0..CRT.................J..............@.0..tls.... ............L..............@.0..reloc..<............N..............@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):124037
                                Entropy (8bit):5.994714381873262
                                Encrypted:false
                                SSDEEP:1536:VISmH83Fqr7AZOZZjgKb1j2omuU4WnA8AnNh/dPQlN:2Z83Mr7AZOZ19Sn+h/GlN
                                MD5:8A34FA3D595165111A9C79F7C21080B4
                                SHA1:D7303C9D6EE9DDEE780AC28E9D83A1EF4F77DB8D
                                SHA-256:A60879833BFE406793B4E5875B93429B658625630D752169AA93A3C151997428
                                SHA-512:5A1C0A88EC41251F6AB1DB8D1AB1CE86F24BA185987546456C396CF97D5CCFA2F9D7D750783F012B6EB0ADB5CF49F18270FB7585DE88B5B02A25093E61AE28C7
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o5_...........#................`..............q................................F......... .................................8...............................|.......................................................x............................text...H...........................`.P`.data...............................@.`..rdata....... ......................@.`@.eh_fram.2...@...4...,..............@.0@.bss..................................0..edata...............`..............@.0@.idata..8............p..............@.0..CRT.................t..............@.0..tls.... ............v..............@.0..reloc..|............x..............@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):545280
                                Entropy (8bit):6.562285454420235
                                Encrypted:false
                                SSDEEP:12288:Qw1Hlm6R2DcKd8wux3cb6PejVKpcPY03bKMhAy:Qwx06AwKd8wux3cb6PejVKpcPYSXh3
                                MD5:A6F7A08B0676F0564A51B5C47973E635
                                SHA1:D56F5F9E2580B81717317DA6582DA9D379426D5B
                                SHA-256:5DD27E845AF9333AD7B907A37AB3D239B75BE6CCC1F51EF4B21E59B037CE778C
                                SHA-512:1101813034DB327AF1C16D069A4DFA91AB97EE8188F9ED1A6DA9D25558866E7E9AF59102E58127E64441D3E4A768B2AD788FD0E5A16DB994A14637BFBADE2954
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.............#.........N......`..............g.......................................... .........................=.... ...............................P.. l...........................@......................d!...............................text...............................`.P`.data............0..................@.`..rdata.. #... ...$..................@.`@.eh_fram8....P.......4..............@.0@.bss....P.............................`..edata..=...........................@.0@.idata....... ......................@.0..CRT.........0......................@.0..tls.... ....@......................@.0..reloc.. l...P...n..................@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):73728
                                Entropy (8bit):5.514830994343325
                                Encrypted:false
                                SSDEEP:768:bC4uF9R4GHnSiWo3xRFTo5THDMOBPw6s//vABzvBcdWlNK2nPpjCesWjcdgMLsZt:bCHQ5HDMK2ADBcd5esWjcdA1jQ5J
                                MD5:C04970B55BCF614F24CA75B1DE641AE2
                                SHA1:52B182CAEF513ED1C36F28EB45CEDB257FA8CE40
                                SHA-256:5DDEE4AAB3CF33E505F52199D64809125B26DE04FB9970CA589CD8619C859D80
                                SHA-512:A5F2660E336BF74A1936FB2E1C724220D862632907F5FD690B365009AC3E1BF35FA6689071F3DA4049E495F340FF83F8438B79079EF1F248B9DCAEDBDD5D3E40
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......HN.7./od./od./od..d./od..d./od..dV/od.X.d./od.X.d./od./nd\/od.X.d./od..ed./od..d./od..d./od..d./odRich./od........PE..L...k1.U...........!.........................................................p............@.............................].......<............................0......P...8...........................8...@............................................text............................... ..`.rdata..MR.......T..................@..@.data....,..........................@....reloc..D1...0...2..................@..B........................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):14350
                                Entropy (8bit):5.05865404841638
                                Encrypted:false
                                SSDEEP:192:shpT8Xnjr0fmsyWM/br9LiM37+EN77RPwvJZNx:shF8f0fmsyrFYEN7pmJ9
                                MD5:BD9E34F243594918C5F08EBFF1516819
                                SHA1:8746AC537712548CCEC433A44228346E82F10D12
                                SHA-256:4D37DD420003AFB8B5284AF4E4C613DFD7E6E3E314FFF51E570AFF298A5DEB87
                                SHA-512:98F2B7A6F5D724A6C8746FFA4D5FDD6B939BF67727D4BA331FAAEC327B7B6B466113CEF9AF74F34F065FF3FF758AFE45F04532069B21BBCBEFB9406D18F87D18
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........8.........#.........4...............0....4p................................%.....@... ......................p..I.......8...............................D...........................@A......................................................text...t...........................`.P`.data...0....0......................@.0..rdata..\....@....... ..............@.@@/4...........P.......&..............@.0@.bss.........`........................`..edata..I....p.......(..............@.0@.idata..8............*..............@.0..CRT....,............0..............@.0..tls.................2..............@.0..reloc..D............4..............@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):14848
                                Entropy (8bit):5.308233229877457
                                Encrypted:false
                                SSDEEP:192:vLBvanDsGzcSu8M6fB+8yTzSJvwZ6Slp2sWOq9+moFelNtflD9Ndk:DBvCDsGzcSDMc+D6FxWR8wF6NP9k
                                MD5:D74AADD701BFACC474C431ACAB7B9265
                                SHA1:8A2B424D1F949430DDC1FADDEE3E9CCB79C95DE2
                                SHA-256:F1029F5CCA3DABFEFFE2C9DB6AD84A9FF0F64F5B2FB85CB6AB348740F756E07D
                                SHA-512:0EF85E311FB4843997FD5F87F0A2EEC9715E26EAE76BFB7BB701D8C043720AEAF7F4825D25187BF35E0A9F00DEF15ED071120128805445F1330C07C3E0EA5CED
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......]...........#.........6...............0.....f.......................................... ......................`.......p..`...............................h....................................................p...............................text...............................`.P`.data...0....0......."..............@.0..rdata.......@.......$..............@.p@.bss....4....P........................p..edata.......`.......*..............@.0@.idata..`....p.......,..............@.0..CRT....,............2..............@.0..tls.... ............4..............@.0..reloc..h............6..............@.0B........................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):76346
                                Entropy (8bit):5.7696675612871084
                                Encrypted:false
                                SSDEEP:768:f5eCnPrwdD7+HgVqoQKJ03cu9F/HTTuDNV3ILkjVSWTn1ytIddmV1TQW/2Y:f5eCMFqHgV1J03cu99HGRCS1yt73Qk
                                MD5:924B90C3D9E645DFAD53F61EA4E91942
                                SHA1:65D397199FF191E5078095036E49F08376F9AE4E
                                SHA-256:41788435F245133EC5511111E2C5D52F7515E359876180067E0B5BA85C729322
                                SHA-512:76833708828C8F3FAD941ABEEA158317AFF98CF0691B5D5DFA4BCA15279CDAD1CC23A771258E4DE41CF12A58F7033A3EE08B0B5EB834D22BE568EA98B183CCD9
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......T....G......#................`..............f.........................@......J......... ................................. ............................0............................... ..........................t............................text...\...........................`.P`.data...............................@.`..rdata..............................@.0@.eh_fram............................@.0@.bss..................................0..edata..............................@.0@.idata.. ...........................@.0..CRT................................@.0..tls.... .... ......................@.0..reloc.......0......................@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):104775
                                Entropy (8bit):5.920298181303241
                                Encrypted:false
                                SSDEEP:768:Hk2/NvkWxqoSZdelQBWFunEmdvo0p7ikHHDC8G1nMbmh2wRU3WMxdFtySA7JiexP:HvNsVoBtQv/p7LHDC8G1e3ndFtbANiC
                                MD5:E1F1AF67E45D6009779A3E73D14BF27F
                                SHA1:EA28A3B3ABCCB3C6EF03439FD46F5EA2F980F99B
                                SHA-256:BAAD1FC5D9A16EB5226943C2A8B1571581C45DA7AA00C1D0A5D12F2040CDABD7
                                SHA-512:CCB501B69BA65396DC7C1BB5077DCD0FEEA1E297C188E5B82160CAB971242599F8A49357C4309D264E705E95E98709B98D31944C4E95F695035E87BC67896EB7
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o5_.@.........#.........<......`..............g.......................................... ......................`..s....p.......................................................................................p...............................text...(...........................`.P`.data...............................@.`..rdata..............................@.0@.eh_fram(/... ...0..................@.0@.bss.........P........................0..edata..s....`.......&..............@.0@.idata.......p.......(..............@.0..CRT.................,..............@.0..tls.... ...........................@.0..reloc...............0..............@.0B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):13338112
                                Entropy (8bit):6.6858669080532245
                                Encrypted:false
                                SSDEEP:196608:1AqDcrkKq7gvvTS2Ax5kwHhJB5tuw/J8aQ8EpfoJsv6tWKFdu9CAfDW:kxXSNBJcaQfmJsv6tWKFdu9CkD
                                MD5:D8696EDA108B46265A24A12CA0B51FDC
                                SHA1:AA034ED2D3827596B44E4E60062015B49FB2358E
                                SHA-256:C76E81E945168C1F3CD5DFFCA4066506764368E273B45560884C82AC4C884975
                                SHA-512:00CE41DBAAB145075E037B6995B58F7D7D7C8E26437AB57EC569B327239C3CBE3BC285FFB6192000134DA6C539E05E8A1F524BBE44E5C170B0EBAA8829B7EAD4
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#......................... ....lc......................................@... ...................... ...:...`...6..................................................................................h...............................text...............................`.P`.data....M... ...N..................@.`..rdata..X.!..p....!..Z..............@.`@.qtmetad ....p.......P..............@.`@.eh_fram.............R..............@.0@.bss..................................`..edata...:... ...<...T..............@.0@.idata...6...`...8..................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.............................@.0B........................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                Entropy (8bit):7.954326346083004
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.53%
                                • InstallShield setup (43055/19) 0.43%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:microPHAZIR_5.4.0.135-windows-installer.exe
                                File size:29'187'584 bytes
                                MD5:fca4f3c56e1762703d00881bc8c4b6ce
                                SHA1:1f123ffd0e807ed6b26838e6baffb06c57c3f582
                                SHA256:12a114e8f0f20fdf0c4924f3539ed6f9a88aad4758b4511662c10e90cbbf37b8
                                SHA512:b45259fc31dd217541a3a779925c4496e88898db0b2805ed64a755b8456c55b7e14338258a78876c37c5334ff08e8ac8aa38ed8e0dd79a09c0ce045cc47277ad
                                SSDEEP:786432:jbQHniddMj+s6k4YVFBzlK9f7tb0CXSwY4+9cG:nyiddwBLVFtlUf7tb08+9cG
                                TLSH:69572358FF8754F5EE139535865BE23F8B34AA048014FEA6EF093F89FD336622419216
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Hp5_......................,..............0....@..........................0-.....9.....@... .......................(.n..
                                Icon Hash:4f6545094c65772b
                                Entrypoint:0x4012a0
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                                Time Stamp:0x5F357048 [Thu Aug 13 16:54:32 2020 UTC]
                                TLS Callbacks:0x5d48c0, 0x5d4870
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f3de104ab04ca2d874306d1847be46db
                                Signature Valid:true
                                Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                                Signature Validation Error:The operation completed successfully
                                Error Number:0
                                Not Before, Not After
                                • 15/07/2019 01:00:00 21/09/2022 13:00:00
                                Subject Chain
                                • CN=Thermo Fisher Scientific Inc., OU=FSI, O=Thermo Fisher Scientific Inc., L=Waltham, S=Massachusetts, C=US, SERIALNUMBER=558016, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                Version:3
                                Thumbprint MD5:A6B4712409CF543B078F4EDBE1A66744
                                Thumbprint SHA-1:AC4C4C66863A87974FE78DF90EE7D34749C25EF0
                                Thumbprint SHA-256:2853C15B803AE0F4135D09A5F2CE4388D261B579BD4911A1C8AC2D612E8957D6
                                Serial:01B9F11DC6C9034D69F3B45F721269B1
                                Instruction
                                sub esp, 1Ch
                                mov dword ptr [esp], 00000002h
                                call dword ptr [0068EE14h]
                                call 00007F7744DC2900h
                                lea esi, dword ptr [esi+00h]
                                lea edi, dword ptr [edi+00000000h]
                                mov eax, dword ptr [0068EE70h]
                                jmp eax
                                mov esi, esi
                                lea edi, dword ptr [edi+00000000h]
                                mov eax, dword ptr [0068EE38h]
                                jmp eax
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                push ebp
                                mov ebp, esp
                                sub esp, 18h
                                mov dword ptr [esp], 005F8000h
                                call 00007F7744F9C3D3h
                                push edx
                                test eax, eax
                                je 00007F7744DC2C17h
                                mov dword ptr [esp+04h], 005F8013h
                                mov dword ptr [esp], eax
                                call 00007F7744F9C3C6h
                                sub esp, 08h
                                test eax, eax
                                je 00007F7744DC2BC3h
                                mov dword ptr [esp+04h], 0068B008h
                                mov dword ptr [esp], 0063B0B8h
                                call eax
                                mov ecx, dword ptr [005F7788h]
                                test ecx, ecx
                                je 00007F7744DC2BE3h
                                mov dword ptr [esp], 005F8029h
                                call 00007F7744F9C390h
                                push edx
                                test eax, eax
                                je 00007F7744DC2BDCh
                                mov dword ptr [esp+04h], 005F8037h
                                mov dword ptr [esp], eax
                                call 00007F7744F9C383h
                                sub esp, 08h
                                test eax, eax
                                je 00007F7744DC2BBBh
                                mov dword ptr [esp], 005F7788h
                                call eax
                                leave
                                ret
                                mov eax, 005D906Ch
                                jmp 00007F7744DC2B59h
                                nop
                                mov eax, 00000000h
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x28d0000x6e.edata
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x28e0000x3c6c.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2940000x2aa90.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x1bd41180x1ce8
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x2bf0000x139c0.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x2930000x18.tls
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x28e9bc0x8a4.idata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x1e1c040x1e1e0034052a9c5bb9175ba4d312f2b28efcd5False0.4722554920557717data6.14816964861621IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .data0x1e30000x1478c0x14800fc7245022e469bdc64511cdbfdcb5a47False0.2959341653963415data3.619083776715985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0x1f80000x42b000x42c00e24261d4cffb73a0d3cc3a1b3694488cFalse0.37740300210674155data5.837879457090782IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                .eh_fram0x23b0000x4f1980x4f2006c615af355bec853d9701ce4a60da66dFalse0.2749709962480253data5.064306410204433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                .bss0x28b0000x1bc80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .edata0x28d0000x6e0x2003e86108dc16870fa1448524fe6777585False0.19140625data1.3500502843388464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                .idata0x28e0000x3c6c0x3e00c9610aa7b4a923ead87944ac3fbc3af6False0.34255292338709675data5.567091863212877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .CRT0x2920000x180x2008f4ee44f67e940e06d9abaa0e9adcde1False0.04296875data0.11446338125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .tls0x2930000x200x2008672d88a3cf8bbfee7a7a9e0d9f19175False0.05078125data0.2311581448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x2940000x2aa900x2ac001ea3a3faa6f46a1bd3e3444c15a54418False0.2666700932017544data3.724868771347981IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .reloc0x2bf0000x139c00x13a00f10b72bad977d5e6441edee7a7440279False0.5751268909235668data6.620440208478497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_CURSOR0x2966600x134dataEnglishUnited States0.37662337662337664
                                RT_CURSOR0x2967940x134dataEnglishUnited States0.3961038961038961
                                RT_CURSOR0x2968c80x134dataEnglishUnited States0.2694805194805195
                                RT_CURSOR0x2969fc0x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"EnglishUnited States0.24675324675324675
                                RT_CURSOR0x296b300x134dataEnglishUnited States0.25
                                RT_CURSOR0x296c640x134dataEnglishUnited States0.2694805194805195
                                RT_CURSOR0x296d980x134dataEnglishUnited States0.32142857142857145
                                RT_CURSOR0x296ecc0x134dataEnglishUnited States0.3246753246753247
                                RT_CURSOR0x2970000x134dataEnglishUnited States0.30844155844155846
                                RT_CURSOR0x2971340x134dataEnglishUnited States0.19480519480519481
                                RT_CURSOR0x2972680x134dataEnglishUnited States0.2694805194805195
                                RT_CURSOR0x29739c0x134dataEnglishUnited States0.2857142857142857
                                RT_CURSOR0x2974d00x134dataEnglishUnited States0.3344155844155844
                                RT_CURSOR0x2976040x134dataEnglishUnited States0.45454545454545453
                                RT_CURSOR0x2977380x134dataEnglishUnited States0.3181818181818182
                                RT_CURSOR0x29786c0x134dataEnglishUnited States0.2077922077922078
                                RT_CURSOR0x2979a00x134dataEnglishUnited States0.39935064935064934
                                RT_CURSOR0x297ad40x134dataEnglishUnited States0.17857142857142858
                                RT_CURSOR0x297c080x134dataEnglishUnited States0.37012987012987014
                                RT_CURSOR0x297d3c0x134dataEnglishUnited States0.22402597402597402
                                RT_CURSOR0x297e700x134dataEnglishUnited States0.21428571428571427
                                RT_CURSOR0x297fa40x134dataEnglishUnited States0.33766233766233766
                                RT_CURSOR0x2980d80x134dataEnglishUnited States0.37987012987012986
                                RT_CURSOR0x29820c0x134dataEnglishUnited States0.37662337662337664
                                RT_CURSOR0x2983400x134dataEnglishUnited States0.3409090909090909
                                RT_CURSOR0x2984740x134dataEnglishUnited States0.4090909090909091
                                RT_CURSOR0x2985a80x134dataEnglishUnited States0.37662337662337664
                                RT_CURSOR0x2986dc0x134dataEnglishUnited States0.3181818181818182
                                RT_CURSOR0x2988100x134dataEnglishUnited States0.4155844155844156
                                RT_CURSOR0x2989440x134dataEnglishUnited States0.38311688311688313
                                RT_CURSOR0x298a780x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.44155844155844154
                                RT_CURSOR0x298bac0x134dataEnglishUnited States0.41233766233766234
                                RT_CURSOR0x298ce00x134dataEnglishUnited States0.21428571428571427
                                RT_CURSOR0x298e140x134dataEnglishUnited States0.3116883116883117
                                RT_CURSOR0x298f480x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.33766233766233766
                                RT_CURSOR0x29907c0x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.3051948051948052
                                RT_CURSOR0x2991b00x134dataEnglishUnited States0.19480519480519481
                                RT_CURSOR0x2992e40x134dataEnglishUnited States0.21428571428571427
                                RT_CURSOR0x2994180x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.19480519480519481
                                RT_CURSOR0x29954c0x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.19155844155844157
                                RT_CURSOR0x2996800x134dataEnglishUnited States0.4383116883116883
                                RT_CURSOR0x2997b40x134dataEnglishUnited States0.21428571428571427
                                RT_CURSOR0x2998e80x134dataEnglishUnited States0.33766233766233766
                                RT_CURSOR0x299a1c0x134dataEnglishUnited States0.37987012987012986
                                RT_CURSOR0x299b500x134dataEnglishUnited States0.4318181818181818
                                RT_CURSOR0x299c840x134dataEnglishUnited States0.18506493506493507
                                RT_CURSOR0x299db80x134dataEnglishUnited States0.37662337662337664
                                RT_CURSOR0x299eec0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.35064935064935066
                                RT_CURSOR0x29a0200x134dataEnglishUnited States0.2922077922077922
                                RT_CURSOR0x29a1540x134dataEnglishUnited States0.19480519480519481
                                RT_CURSOR0x29a2880x134dataEnglishUnited States0.19805194805194806
                                RT_CURSOR0x29a3bc0x134dataEnglishUnited States0.2824675324675325
                                RT_CURSOR0x29a4f00x134dataEnglishUnited States0.32142857142857145
                                RT_CURSOR0x29a6240x134dataEnglishUnited States0.262987012987013
                                RT_CURSOR0x29a7580x134dataEnglishUnited States0.288961038961039
                                RT_CURSOR0x29a88c0x134dataEnglishUnited States0.2435064935064935
                                RT_CURSOR0x29a9c00x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.2435064935064935
                                RT_CURSOR0x29aaf40x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.24675324675324675
                                RT_CURSOR0x29ac280x134dataEnglishUnited States0.3116883116883117
                                RT_CURSOR0x29ad5c0x134dataEnglishUnited States0.36038961038961037
                                RT_CURSOR0x29ae900x134dataEnglishUnited States0.32792207792207795
                                RT_CURSOR0x29afc40x134dataEnglishUnited States0.37337662337662336
                                RT_CURSOR0x29b0f80x134dataEnglishUnited States0.2597402597402597
                                RT_CURSOR0x29b22c0x134dataEnglishUnited States0.4512987012987013
                                RT_CURSOR0x29b3600x134dataEnglishUnited States0.36688311688311687
                                RT_CURSOR0x29b4940x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.18831168831168832
                                RT_CURSOR0x29b5c80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38311688311688313
                                RT_CURSOR0x29b6fc0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.3181818181818182
                                RT_CURSOR0x29b8300x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.32142857142857145
                                RT_CURSOR0x29b9640x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.30194805194805197
                                RT_CURSOR0x29ba980x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"EnglishUnited States0.19480519480519481
                                RT_CURSOR0x29bbcc0x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"EnglishUnited States0.3409090909090909
                                RT_CURSOR0x29bd000x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"EnglishUnited States0.18831168831168832
                                RT_CURSOR0x29be340x134dataEnglishUnited States0.3246753246753247
                                RT_CURSOR0x29bf680x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"EnglishUnited States0.18831168831168832
                                RT_CURSOR0x29c09c0x134dataEnglishUnited States0.288961038961039
                                RT_CURSOR0x29c1d00x134dataEnglishUnited States0.24025974025974026
                                RT_CURSOR0x29c3040x134dataEnglishUnited States0.12012987012987013
                                RT_BITMAP0x29c4380x340Device independent bitmap graphic, 52 x 26 x 4, image size 728EnglishUnited States0.40625
                                RT_ICON0x29c7780x58b0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9941420014094433
                                RT_ICON0x2a20280x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.12464572508266415
                                RT_ICON0x2a62500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.20062240663900416
                                RT_ICON0x2a87f80x1eb6PNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9994912236072246
                                RT_ICON0x2aa6ae0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3027673545966229
                                RT_ICON0x2ab7560x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.364344262295082
                                RT_ICON0x2ac0de0x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.38222543352601157
                                RT_DIALOG0x2ac6460x23adataEnglishUnited States0.5421052631578948
                                RT_GROUP_CURSOR0x2ac8800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                RT_GROUP_CURSOR0x2ac8940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac8a80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac8bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac8d00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac8e40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac8f80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac90c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac95c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9e80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ac9fc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2aca9c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acab00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acac40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acad80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                RT_GROUP_CURSOR0x2acaec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb280x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb3c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb500x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb640x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb780x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acb8c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acba00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acbb40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acbc80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acbdc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acbf00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc180x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc2c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc400x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc540x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc680x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc7c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acc900x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acca40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2accb80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acccc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acce00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2accf40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd1c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd6c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                RT_GROUP_CURSOR0x2acd800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acd940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acda80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acdbc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acdd00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acde40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2acdf80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ace0c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ace200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ace340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ace480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ace5c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_CURSOR0x2ace700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                RT_GROUP_CURSOR0x2ace840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                RT_GROUP_ICON0x2ace980x68dataEnglishUnited States0.7884615384615384
                                RT_VERSION0x2acf000x2b0dataEnglishUnited States0.48255813953488375
                                RT_MANIFEST0x2ad1b00x770XML 1.0 document, ASCII textEnglishUnited States0.3860294117647059
                                DLLImport
                                ADVAPI32.DLLGetSecurityDescriptorOwner, GetSidIdentifierAuthority, GetUserNameA, GetUserNameW, RegCloseKey, RegOpenKeyExA, RegQueryValueExA
                                COMCTL32.DLLInitCommonControlsEx
                                COMDLG32.DLLChooseColorA, CommDlgExtendedError, GetOpenFileNameA, GetOpenFileNameW, GetSaveFileNameA, GetSaveFileNameW
                                GDI32.dllArc, BitBlt, Chord, CombineRgn, CreateBitmap, CreateCompatibleBitmap, CreateCompatibleDC, CreateDCA, CreateDIBSection, CreateDIBitmap, CreateFontIndirectA, CreateFontIndirectW, CreatePalette, CreatePatternBrush, CreatePen, CreateRectRgn, CreateRectRgnIndirect, CreateSolidBrush, DPtoLP, DeleteDC, DeleteObject, EnumFontFamiliesA, EnumFontFamiliesW, ExtCreatePen, ExtTextOutA, GetBkMode, GetCharWidthA, GetCharWidthW, GetDIBits, GetDeviceCaps, GetFontData, GetMapMode, GetNearestColor, GetNearestPaletteIndex, GetObjectA, GetPaletteEntries, GetPixel, GetRgnBox, GetStockObject, GetTextCharset, GetTextExtentPoint32A, GetTextExtentPoint32W, GetTextExtentPointA, GetTextFaceA, GetTextFaceW, GetTextMetricsA, OffsetClipRgn, PatBlt, Pie, Polygon, Polyline, RealizePalette, RectInRegion, Rectangle, ResizePalette, SelectClipRgn, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetBrushOrgEx, SetMapMode, SetPaletteEntries, SetPolyFillMode, SetROP2, SetRectRgn, SetTextAlign, SetTextColor, StretchDIBits, TextOutA, TextOutW, TranslateCharsetInfo, UpdateColors
                                IMM32.DLLImmGetCompositionStringA, ImmGetCompositionStringW, ImmGetContext, ImmReleaseContext, ImmSetCompositionWindow
                                KERNEL32.dllBuildCommDCBA, BuildCommDCBW, ClearCommError, CloseHandle, CopyFileA, CopyFileW, CreateDirectoryA, CreateDirectoryW, CreateEventA, CreateFileA, CreateFileMappingA, CreateFileW, CreatePipe, CreateProcessA, CreateProcessW, CreateSemaphoreA, CreateThread, DeleteCriticalSection, DeleteFileA, DeleteFileW, DeviceIoControl, DuplicateHandle, EnterCriticalSection, EscapeCommFunction, ExitProcess, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileA, FindNextFileW, FindResourceA, FlushFileBuffers, FormatMessageA, FreeLibrary, GetACP, GetCommModemStatus, GetCommState, GetCommandLineA, GetComputerNameA, GetComputerNameW, GetConsoleCP, GetConsoleMode, GetCurrentDirectoryA, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentVariableW, GetExitCodeProcess, GetExitCodeThread, GetFileAttributesA, GetFileAttributesW, GetFileInformationByHandle, GetFileType, GetFullPathNameA, GetFullPathNameW, GetLastError, GetLocaleInfoA, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetOverlappedResult, GetPrivateProfileStringA, GetProcAddress, GetProcessHeap, GetShortPathNameA, GetShortPathNameW, GetStartupInfoA, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetTempFileNameA, GetTempFileNameW, GetTempPathA, GetTempPathW, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GetVolumeInformationA, GetVolumeInformationW, GetWindowsDirectoryA, GetWindowsDirectoryW, GlobalAlloc, GlobalLock, GlobalUnlock, HeapAlloc, HeapFree, InitializeCriticalSection, InterlockedDecrement, InterlockedIncrement, IsDBCSLeadByte, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryExW, LoadResource, LocalFree, LockResource, MapViewOfFile, MoveFileA, MoveFileW, MulDiv, MultiByteToWideChar, OutputDebugStringA, PeekConsoleInputA, PeekNamedPipe, PurgeComm, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, ReleaseSemaphore, RemoveDirectoryA, RemoveDirectoryW, ResetEvent, SearchPathA, SearchPathW, SetCommState, SetCommTimeouts, SetConsoleMode, SetCurrentDirectoryA, SetCurrentDirectoryW, SetEndOfFile, SetEnvironmentVariableW, SetErrorMode, SetEvent, SetFileAttributesA, SetFileAttributesW, SetFilePointer, SetFileTime, SetHandleInformation, SetLastError, SetThreadPriority, SetUnhandledExceptionFilter, SetupComm, Sleep, TerminateThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleA, WriteConsoleW, WriteFile, lstrcpyA, lstrcpyW, lstrcpynA, lstrlenA, lstrlenW
                                msvcrt.dll_ftime, _getpid, _hypot, _isatty, _putenv, _strdup, _stricmp, _strnicmp, _timezone, _tzset, _write
                                msvcrt.dll__getmainargs, __mb_cur_max, __p___argc, __p___argv, __p__environ, __p__fmode, __set_app_type, _beginthreadex, _cexit, _endthreadex, _errno, _fdopen, _get_osfhandle, _iob, _isctype, _onexit, _open, _pctype, _setmode, _stricmp, _strnicmp, _strtoi64, _wcsicmp, _wopen, abort, acos, asin, atan, atan2, atexit, atoi, calloc, ceil, cos, cosh, ctime, exit, exp, fclose, fflush, floor, fmod, fprintf, fputc, fputs, fread, free, frexp, fseek, ftell, fwrite, getenv, gmtime, isalnum, ldexp, localtime, log, log10, malloc, memcmp, memcpy, memmove, memset, mktime, modf, pow, printf, puts, qsort, realloc, setlocale, signal, sin, sinh, sprintf, sqrt, sscanf, strcat, strchr, strcmp, strcpy, strcspn, strerror, strlen, strncmp, strncpy, strpbrk, strrchr, strspn, strstr, strtod, strtol, strtoul, swprintf, tan, tanh, time, tolower, toupper, vfprintf, vsprintf, wcschr, wcscmp, wcscpy, wcslen, wcsncmp, wcsncpy
                                OLE32.dllCreateBindCtx, CreateFileMoniker, GetRunningObjectTable
                                OLEAUT32.DLLCreateErrorInfo, SetErrorInfo, SysAllocString, SysFreeString, VariantChangeType, VariantClear, VariantInit
                                SHELL32.DLLSHBrowseForFolderA, SHBrowseForFolderW, SHGetDesktopFolder, SHGetMalloc, SHGetPathFromIDListA, SHGetPathFromIDListW
                                USER32.dllAdjustWindowRectEx, BeginPaint, CallNextHookEx, CallWindowProcA, CallWindowProcW, CharLowerA, CharLowerW, ClientToScreen, CloseClipboard, CreateCaret, CreateIconFromResource, CreateIconIndirect, CreateMenu, CreatePopupMenu, CreateWindowExA, CreateWindowExW, DefWindowProcA, DefWindowProcW, DestroyCaret, DestroyIcon, DestroyMenu, DestroyWindow, DispatchMessageA, DrawEdge, DrawFocusRect, DrawFrameControl, DrawMenuBar, EmptyClipboard, EnableWindow, EndPaint, EnumWindows, FillRect, GetAsyncKeyState, GetCapture, GetClassLongA, GetClientRect, GetClipboardData, GetClipboardOwner, GetCursorPos, GetDC, GetDesktopWindow, GetFocus, GetForegroundWindow, GetKeyState, GetKeyboardLayout, GetMenuCheckMarkDimensions, GetMenuItemCount, GetMessageA, GetMessagePos, GetParent, GetSysColor, GetSysColorBrush, GetSystemMenu, GetSystemMetrics, GetWindow, GetWindowLongA, GetWindowPlacement, GetWindowRect, GetWindowTextA, GetWindowTextW, InsertMenuA, InsertMenuW, InvalidateRect, IsClipboardFormatAvailable, IsIconic, IsWindow, IsWindowVisible, IsZoomed, KillTimer, LoadBitmapA, LoadCursorA, LoadCursorFromFileA, LoadIconA, MapVirtualKeyA, MessageBeep, MessageBoxA, MessageBoxW, MoveWindow, MsgWaitForMultipleObjectsEx, OpenClipboard, PeekMessageA, PostMessageA, PostQuitMessage, RegisterClassA, RegisterClassExA, RegisterClassW, ReleaseCapture, ReleaseDC, RemoveMenu, ScreenToClient, ScrollWindowEx, SendInput, SendMessageA, SendMessageW, SetActiveWindow, SetCapture, SetCaretPos, SetClassLongA, SetClipboardData, SetCursor, SetCursorPos, SetFocus, SetForegroundWindow, SetMenu, SetParent, SetScrollInfo, SetTimer, SetWindowLongA, SetWindowLongW, SetWindowPos, SetWindowTextA, SetWindowTextW, SetWindowsHookExA, ShowWindow, SystemParametersInfoA, ToAscii, TrackPopupMenu, TranslateMessage, UnhookWindowsHookEx, UnregisterClassA, UpdateWindow, VkKeyScanA, WaitForInputIdle, WindowFromPoint, wsprintfA, wsprintfW
                                WS2_32.dllWSAAsyncSelect, WSACleanup, WSAGetLastError, WSAStartup, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getsockname, getsockopt, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohs, recv, select, send, setsockopt, socket
                                NameOrdinalAddress
                                TclKit_AppInit10x402e34
                                TclKit_SetKitPath20x403234
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Target ID:0
                                Start time:20:49:23
                                Start date:26/05/2024
                                Path:C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\microPHAZIR_5.4.0.135-windows-installer.exe"
                                Imagebase:0x360000
                                File size:29'187'584 bytes
                                MD5 hash:FCA4F3C56E1762703D00881BC8C4B6CE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:2.7%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:7.6%
                                  Total number of Nodes:1164
                                  Total number of Limit Nodes:122
                                  execution_graph 81999 469a84 82006 469168 81999->82006 82001 469baf 82002 469aa3 82002->82001 82005 469840 6 API calls 82002->82005 82012 46cad0 82002->82012 82027 434088 8 API calls 82002->82027 82005->82002 82028 4dc968 6 API calls 82006->82028 82008 469180 82008->82002 82009 46917a 82009->82008 82029 4dc994 6 API calls 82009->82029 82011 4691b0 82011->82002 82013 469168 6 API calls 82012->82013 82015 46caf2 82013->82015 82014 46cb01 82014->82002 82015->82014 82016 46cb53 PeekMessageA 82015->82016 82017 46cbe5 PeekMessageA 82016->82017 82018 46cbaf 82016->82018 82020 46cc14 82017->82020 82021 46cc50 GetMessageA 82017->82021 82019 46cbb4 MsgWaitForMultipleObjectsEx 82018->82019 82019->82019 82024 46cbe2 82019->82024 82025 46cc16 ResetEvent 82020->82025 82022 46cc77 82021->82022 82023 46cc38 PostQuitMessage 82021->82023 82022->82020 82026 46cc7a TranslateMessage DispatchMessageA 82022->82026 82023->82020 82024->82017 82024->82020 82025->82002 82026->82025 82027->82002 82028->82009 82029->82011 82030 378d30 82031 378d4d 82030->82031 82033 378d68 82030->82033 82032 395c98 82031->82032 82034 395afb 82031->82034 82035 395b60 82031->82035 82049 395c7d DefWindowProcA 82032->82049 82059 3940c0 TranslateCharsetInfo wsprintfA 82032->82059 82037 378d8f 82033->82037 82044 378dac SendMessageA 82033->82044 82039 395bc8 82034->82039 82040 395b07 82034->82040 82038 395c4c 82035->82038 82042 395b69 82035->82042 82058 395094 20 API calls 82038->82058 82056 394518 11 API calls 82039->82056 82040->82042 82045 395b15 82040->82045 82046 395c00 82040->82046 82042->82045 82050 395b48 82042->82050 82044->82037 82055 395914 21 API calls 82045->82055 82048 395c0e 82046->82048 82046->82050 82047 395bdd 82047->82049 82047->82050 82057 395914 21 API calls 82048->82057 82049->82032 82053 395b3d 82053->82032 82054 395b45 82053->82054 82054->82050 82055->82053 82056->82047 82057->82054 82058->82047 82059->82032 82060 4daac4 CreateDirectoryW 82061 4daae8 GetLastError 82060->82061 82062 4daae1 82060->82062 82063 4daaf5 82061->82063 82064 37c73c 82065 37c765 82064->82065 82066 37c76c 82065->82066 82070 3789e4 82065->82070 82069 37c79b 82066->82069 82084 37a118 82066->82084 82071 378a0b 82070->82071 82072 378a33 82071->82072 82073 378b94 LoadLibraryA 82071->82073 82075 378bd4 LoadLibraryA 82071->82075 82078 378b68 82071->82078 82082 378af5 82071->82082 82083 378b8c 82071->82083 82089 39423c 82071->82089 82072->82066 82073->82071 82074 378bab GetProcAddress FreeLibrary 82073->82074 82074->82071 82075->82071 82077 378beb GetProcAddress FreeLibrary 82075->82077 82077->82071 82079 39423c GetModuleHandleA 82078->82079 82080 378b6d LoadIconA 82079->82080 82081 378af8 LoadCursorA 82080->82081 82081->82072 82082->82081 82083->82073 82085 37a15c 82084->82085 82086 37a135 82084->82086 82085->82069 82087 37a16e ShowWindow 82086->82087 82088 37a151 82086->82088 82087->82069 82088->82069 82090 394248 GetModuleHandleA 82089->82090 82091 394245 82089->82091 82090->82071 82091->82071 82092 4d6ec0 82093 4d6eec 82092->82093 82094 4d6f18 GetLastError 82093->82094 82095 4d6ef3 GetFileAttributesW 82093->82095 82097 4d6f25 82094->82097 82095->82094 82096 4d6f04 82095->82096 82099 4d6f08 82096->82099 82100 465dfc _errno 82096->82100 82100->82099 82101 46fbc8 82103 46fbde 82101->82103 82102 46fd50 82109 46fe2c 82102->82109 82112 46fe00 82102->82112 82114 46fd80 82102->82114 82117 46fdb8 82102->82117 82103->82102 82104 46fd44 82103->82104 82107 46fc0c 82103->82107 82119 46fd04 82103->82119 82149 468df4 fprintf fputc fflush abort 82104->82149 82106 46fe70 82108 46fe7c GetLastError 82106->82108 82107->82102 82107->82106 82111 46fe48 GetFileAttributesW 82107->82111 82120 46fc65 82107->82120 82108->82117 82150 4dd82c 52 API calls 82109->82150 82118 46fc7c CreateFileW 82111->82118 82111->82120 82113 46fe40 82115 46ff34 GetLastError 82114->82115 82116 46fd99 82114->82116 82122 46ff41 82115->82122 82117->82119 82151 465e10 10 API calls 82117->82151 82118->82108 82121 46fcb9 82118->82121 82120->82118 82141 46f5c0 GetFileType 82121->82141 82122->82119 82153 465e10 10 API calls 82122->82153 82125 46fcbe 82125->82102 82127 46fcc7 82125->82127 82126 46feb1 82129 46fec5 82126->82129 82130 43dddc 4 API calls 82126->82130 82131 46ffa8 82127->82131 82132 46fcd9 82127->82132 82152 4417b8 6 API calls 82129->82152 82130->82129 82155 43dddc 82131->82155 82148 4417b8 6 API calls 82132->82148 82133 46ff5f 82137 46ff6f 82133->82137 82139 43dddc 4 API calls 82133->82139 82154 4417b8 6 API calls 82137->82154 82138 46fef4 82139->82137 82142 46f5d7 82141->82142 82143 46f5ed GetConsoleMode 82141->82143 82144 46f5e4 GetLastError 82142->82144 82145 46f5db 82142->82145 82146 46f614 GetCommState 82143->82146 82147 46f604 82143->82147 82144->82143 82144->82145 82145->82125 82146->82145 82147->82125 82148->82119 82149->82102 82150->82113 82151->82126 82152->82138 82153->82133 82154->82119 82156 43ddf0 82155->82156 82157 43ddeb 82155->82157 82158 43ddfa 82156->82158 82160 468df4 fprintf fputc fflush abort 82156->82160 82157->82126 82158->82126 82160->82158 82161 465188 82163 465194 82161->82163 82166 4651d7 82161->82166 82164 4651be 82163->82164 82165 4651f8 82163->82165 82169 4db768 82164->82169 82196 43dbac 82165->82196 82168 465200 82170 4db77a 82169->82170 82171 4db775 82169->82171 82210 465dfc _errno 82170->82210 82171->82170 82172 4db794 DeleteFileW 82171->82172 82174 4db7ac GetLastError 82172->82174 82175 4db7a4 82172->82175 82176 4db7b9 82174->82176 82175->82166 82209 465dec _errno 82176->82209 82178 4db7be 82179 4db7e8 GetFileAttributesW 82178->82179 82180 4db7c3 82178->82180 82182 4db7fb 82179->82182 82195 4db7db 82179->82195 82211 465dec _errno 82180->82211 82184 4db7ff 82182->82184 82185 4db84b 82182->82185 82183 4db7c8 82183->82184 82186 4db7cd 82183->82186 82184->82175 82184->82195 82213 465dfc _errno 82184->82213 82190 4db868 82185->82190 82191 4db8b6 GetLastError 82185->82191 82185->82195 82212 465dec _errno 82186->82212 82189 4db7d2 82189->82195 82214 465dfc _errno 82189->82214 82190->82175 82194 4db87c GetLastError 82190->82194 82193 4db786 82191->82193 82193->82166 82194->82195 82195->82166 82197 43dbbd 82196->82197 82198 43dc68 82197->82198 82199 43dbed 82197->82199 82215 46d630 fprintf fputc fflush abort calloc 82198->82215 82201 469168 6 API calls 82199->82201 82202 43dc01 82201->82202 82206 43dc09 82202->82206 82216 46d630 fprintf fputc fflush abort calloc 82202->82216 82203 469168 6 API calls 82204 43dc26 82203->82204 82204->82168 82206->82203 82207 43dc8a 82207->82206 82217 46d630 fprintf fputc fflush abort calloc 82207->82217 82209->82178 82210->82193 82211->82183 82212->82189 82213->82193 82214->82193 82215->82206 82216->82207 82217->82207 82218 4d8e1c 82219 4d8e32 82218->82219 82220 43dddc 4 API calls 82219->82220 82227 4d8e41 82220->82227 82221 4d8e4f 82230 4d91b8 82221->82230 82231 43dbac 7 API calls 82221->82231 82235 4d8f11 FindFirstFileW 82221->82235 82237 4d8f47 FindClose 82221->82237 82239 4d8f77 wcslen 82221->82239 82241 4d90f8 82221->82241 82242 43dddc fprintf fputc fflush abort 82221->82242 82246 44c154 fprintf fputc fflush abort 82221->82246 82222 4d94a1 82223 4d94aa GetFileAttributesA 82222->82223 82225 4d94ba 82223->82225 82223->82230 82224 43dbac 7 API calls 82226 4d9440 82224->82226 82225->82221 82227->82221 82227->82222 82228 4d933a GetFileAttributesA 82227->82228 82229 4d9262 FindFirstFileA 82227->82229 82227->82230 82228->82230 82234 4d9289 82228->82234 82229->82223 82229->82234 82230->82224 82240 4d91ef 82230->82240 82231->82221 82232 4d93c8 82232->82230 82233 4d9297 FindClose 82233->82234 82234->82227 82234->82232 82234->82233 82235->82221 82236 4d94f5 82235->82236 82237->82221 82239->82221 82241->82230 82247 44c154 fprintf fputc fflush abort 82241->82247 82242->82221 82244 4d9180 82244->82230 82245 43dbac 7 API calls 82244->82245 82245->82230 82246->82221 82247->82244 82248 3e74e8 82249 3e7506 82248->82249 82250 39423c GetModuleHandleA 82249->82250 82251 3e750d CreateWindowExA 82250->82251 82253 3e757b 82251->82253 82252 39423c GetModuleHandleA 82254 3e7580 CreateWindowExA 82252->82254 82253->82252 82255 3e75ea 82254->82255 82256 46d3d0 82257 46d4f8 82256->82257 82258 46d3e7 82256->82258 82259 46d3ff 82258->82259 82260 46d4ec 82258->82260 82268 46d456 82258->82268 82272 46cdd4 82259->82272 82292 46ce14 fprintf fputc fflush abort calloc 82260->82292 82264 46d4f1 82264->82259 82265 46d41c 82267 46d471 82265->82267 82276 46d0b0 82265->82276 82266 46d4bb realloc 82266->82268 82273 46ce0c 82272->82273 82274 46cdec 82272->82274 82273->82265 82273->82266 82293 468df4 fprintf fputc fflush abort 82274->82293 82277 46d0c4 82276->82277 82281 46d113 82276->82281 82278 46d2c8 82277->82278 82279 46d14c malloc 82277->82279 82283 46d0de 82277->82283 82278->82283 82294 46ce14 fprintf fputc fflush abort calloc 82278->82294 82279->82281 82281->82268 82284 46d334 82281->82284 82282 46d311 malloc 82282->82281 82282->82283 82283->82278 82283->82281 82283->82282 82285 46d33f 82284->82285 82290 46d351 82284->82290 82286 46d3c4 82285->82286 82287 46d34a 82285->82287 82295 46ce14 fprintf fputc fflush abort calloc 82286->82295 82288 46cdd4 4 API calls 82287->82288 82288->82290 82290->82268 82291 46d3c9 82291->82287 82292->82264 82293->82273 82294->82278 82295->82291 82296 3e6be8 82297 3e6c17 82296->82297 82298 3e6c1b 82297->82298 82299 3e6c28 DefWindowProcA 82297->82299 82300 434114 82303 43412a 82300->82303 82301 4343dc 82302 4345f5 82323 4342d3 82302->82323 82326 434a30 sprintf 82302->82326 82303->82301 82303->82302 82304 434318 82303->82304 82305 4341dd 82303->82305 82308 43dddc 4 API calls 82304->82308 82306 4341ea 82305->82306 82307 4342e8 82305->82307 82310 434460 82306->82310 82306->82323 82331 4345cd 82306->82331 82333 434258 memcmp 82306->82333 82307->82310 82311 4342ee 82307->82311 82309 434323 82308->82309 82359 4417b8 6 API calls 82309->82359 82313 4342fc 82310->82313 82318 43447b 82310->82318 82314 4342f3 82311->82314 82317 434360 82311->82317 82358 468df4 fprintf fputc fflush abort 82313->82358 82314->82313 82319 434410 82314->82319 82315 43434e 82317->82302 82324 43438c 82317->82324 82322 434495 82318->82322 82318->82323 82357 43472c 82318->82357 82319->82302 82327 43441e 82319->82327 82321 434308 82325 4345b0 82322->82325 82345 4343a5 82322->82345 82360 45dca4 9 API calls 82324->82360 82363 45dca4 9 API calls 82325->82363 82369 441818 9 API calls 82326->82369 82327->82323 82347 434a70 82327->82347 82365 43db44 6 API calls 82327->82365 82364 45dca4 9 API calls 82331->82364 82332 434a8f 82370 4417b8 6 API calls 82332->82370 82333->82306 82336 43426c 82333->82336 82339 43428f 82336->82339 82346 43dbac 7 API calls 82336->82346 82337 43dddc 4 API calls 82337->82332 82338 43469e 82366 440024 fprintf fputc fflush abort 82338->82366 82339->82323 82339->82347 82351 43429e 82339->82351 82341 4346ba 82344 4346ca 82341->82344 82341->82347 82342 43dbac 7 API calls 82342->82351 82367 440024 fprintf fputc fflush abort 82344->82367 82361 44c568 12 API calls 82345->82361 82346->82339 82347->82332 82347->82337 82348 43458f 82362 441458 7 API calls 82348->82362 82350 4345a2 82351->82323 82351->82342 82353 4346f1 82368 441458 7 API calls 82353->82368 82354 4617d4 8 API calls 82354->82357 82356 46cca0 Sleep 82356->82357 82357->82323 82357->82354 82357->82356 82358->82321 82359->82315 82360->82345 82361->82348 82362->82350 82363->82331 82364->82302 82365->82338 82366->82341 82367->82353 82368->82323 82369->82351 82370->82323 82371 458ddc SetErrorMode SetErrorMode GetModuleHandleA 82372 458e17 82371->82372 82373 465e5c 82376 4d64c0 82373->82376 82375 465e8d 82377 4678e0 82376->82377 82378 4d64d8 LoadLibraryExW 82377->82378 82379 4d650e 82378->82379 82380 4d6530 82378->82380 82379->82375 82381 43dddc 4 API calls 82380->82381 82382 4d6538 82381->82382 82382->82379 82383 4d659d GetLastError 82382->82383 82384 43dddc 4 API calls 82383->82384 82385 4d65ac 82384->82385 82405 4417b8 6 API calls 82385->82405 82387 4d65d7 82388 4d65df 82387->82388 82389 4d662b 82387->82389 82391 4d6654 82388->82391 82392 4d65e1 82388->82392 82408 4417b8 6 API calls 82389->82408 82393 4d668d 82391->82393 82394 4d665c 82391->82394 82395 4d6664 82392->82395 82396 4d65e6 82392->82396 82410 4417b8 6 API calls 82393->82410 82394->82395 82398 4d65ef 82394->82398 82409 4417b8 6 API calls 82395->82409 82396->82398 82399 4d66b6 82396->82399 82406 465e10 10 API calls 82398->82406 82411 4417b8 6 API calls 82399->82411 82403 4d6606 82407 4417b8 6 API calls 82403->82407 82405->82387 82406->82403 82407->82379 82408->82379 82409->82379 82410->82379 82411->82379 82412 40985c 82413 39423c GetModuleHandleA 82412->82413 82414 409872 LoadIconA LoadIconA LoadCursorA RegisterClassExA 82413->82414 82415 409977 CreateWindowExA SetWindowLongA ShowWindow UpdateWindow 82414->82415 82416 409a0b 82414->82416 82415->82416 82419 4326f8 82416->82419 82418 409a2b 82421 432712 82419->82421 82420 432918 82420->82418 82421->82420 82422 43281f CreateBitmap CreatePatternBrush 82421->82422 82423 432872 82422->82423 82423->82418 82424 46f4d8 82425 46f4f1 82424->82425 82426 46f4fa CloseHandle 82425->82426 82427 46f558 GetStdHandle 82425->82427 82428 46f50e 82426->82428 82430 46f5a5 GetLastError 82426->82430 82427->82428 82429 46f56a GetStdHandle 82427->82429 82434 469168 6 API calls 82428->82434 82429->82428 82431 46f57c GetStdHandle 82429->82431 82437 4dcb64 82430->82437 82431->82428 82433 46f594 CloseHandle 82431->82433 82433->82428 82433->82430 82436 46f524 82434->82436 82438 4dcb6f 82437->82438 82439 46f698 82440 46f6f4 SetFilePointer 82439->82440 82441 46f6b1 WriteFile 82439->82441 82440->82441 82442 46f6e3 82441->82442 82443 46f71c GetLastError 82441->82443 82444 4dcb64 82443->82444 82445 46f729 _errno 82444->82445 82445->82442 82446 49e16c 82447 49e1f0 82446->82447 82449 49e188 82446->82449 82448 49e224 82448->82447 82452 46d508 82448->82452 82449->82447 82449->82448 82451 49e1d8 memcmp 82449->82451 82451->82447 82451->82449 82453 46d514 82452->82453 82454 46d602 82453->82454 82457 46d51e 82453->82457 82463 46ce14 fprintf fputc fflush abort calloc 82454->82463 82456 46d607 82456->82457 82458 46d525 82457->82458 82459 46d5b8 malloc 82457->82459 82458->82447 82460 46d5d4 82459->82460 82461 46d60e 82459->82461 82460->82447 82464 468df4 fprintf fputc fflush abort 82461->82464 82463->82456 82464->82460 82465 3dcc94 82466 3dcca4 GetDC 82465->82466 82473 394270 82466->82473 82469 3dccb7 82470 3dccf8 EnumFontFamiliesW 82469->82470 82471 3dccd7 EnumFontFamiliesA 82469->82471 82472 3dccdf ReleaseDC 82470->82472 82471->82472 82474 394279 82473->82474 82475 39427c GetVersionExA 82473->82475 82474->82469 82476 3942bc 82475->82476 82479 3942a7 82475->82479 82477 3942ca RegOpenKeyExA 82476->82477 82476->82479 82478 394328 RegQueryValueExA RegCloseKey 82477->82478 82477->82479 82478->82479 82479->82469 82480 46b62c 82481 46b644 82480->82481 82486 46b7fc 82480->82486 82482 46b64e _ftime 82481->82482 82484 46b695 EnterCriticalSection QueryPerformanceCounter 82481->82484 82483 46b67b 82482->82483 82490 46b717 82484->82490 82485 46b818 QueryPerformanceFrequency 82485->82486 82486->82485 82488 46b837 GetSystemInfo 82486->82488 82489 46b8aa 7 API calls 82486->82489 82487 46b88a LeaveCriticalSection 82487->82482 82488->82486 82489->82486 82490->82487 82491 46b727 82490->82491 82492 46b7de LeaveCriticalSection 82491->82492 82492->82483 82493 37cfdc 82494 37cffe 82493->82494 82520 37d5cc 82493->82520 82495 37d000 82494->82495 82496 37d058 82494->82496 82500 37d011 82495->82500 82501 37d15c 82495->82501 82541 37d027 82495->82541 82498 37d5c0 82496->82498 82509 37d061 82496->82509 82573 378dfc GetWindowLongA 82498->82573 82502 37d750 82500->82502 82503 37d01c 82500->82503 82504 37d165 82501->82504 82505 37d4ec 82501->82505 82576 378ecc 17 API calls 82502->82576 82506 37d728 82503->82506 82503->82541 82507 37d170 82504->82507 82508 37d4b8 82504->82508 82570 378dfc GetWindowLongA 82505->82570 82575 378ecc 17 API calls 82506->82575 82507->82541 82567 378dfc GetWindowLongA 82507->82567 82569 378dfc GetWindowLongA 82508->82569 82509->82541 82572 378dfc GetWindowLongA 82509->82572 82510 37d770 82577 378dfc GetWindowLongA 82510->82577 82513 37d439 82540 37d104 82513->82540 82516 37d4f8 82523 37d523 82516->82523 82524 37d7e8 6 API calls 82516->82524 82516->82541 82517 378dfc GetWindowLongA 82517->82541 82574 378dfc GetWindowLongA 82520->82574 82522 37d187 82526 37d191 IsWindowVisible 82522->82526 82522->82541 82571 394854 16 API calls 82523->82571 82532 37d0f9 82524->82532 82528 37d94c GetWindowPlacement 82526->82528 82530 37d1ab 82526->82530 82529 37d977 82528->82529 82528->82541 82529->82530 82531 37d1e9 GetClientRect 82530->82531 82530->82541 82533 376940 82531->82533 82536 37d8f0 SetFocus 82532->82536 82537 37d40f 82532->82537 82532->82540 82535 37d23f MoveWindow 82533->82535 82534 37d09d 82534->82532 82538 37d0c9 SendMessageA 82534->82538 82534->82540 82535->82541 82536->82540 82568 395914 21 API calls 82537->82568 82538->82532 82538->82540 82541->82510 82541->82517 82541->82534 82541->82540 82542 3dc870 82541->82542 82543 3dca99 82542->82543 82544 3dc892 SystemParametersInfoA 82542->82544 82545 3dc8da SystemParametersInfoA 82544->82545 82546 3dc9e4 82544->82546 82548 3dc911 GetDC GetDeviceCaps MulDiv MulDiv ReleaseDC 82545->82548 82566 3dca7e 82545->82566 82547 3dbf60 2 API calls 82546->82547 82550 3dc9fc 82547->82550 82578 3dbf60 CreateFontIndirectA 82548->82578 82549 3dbf60 2 API calls 82549->82543 82552 3dbf60 2 API calls 82550->82552 82554 3dca0d 82552->82554 82553 3dc9af 82555 3dc9b4 GetStockObject 82553->82555 82558 3dc9d8 82553->82558 82556 3dbf60 2 API calls 82554->82556 82555->82553 82557 3dca1e 82556->82557 82559 3dbf60 2 API calls 82557->82559 82558->82541 82560 3dca36 82559->82560 82561 3dbf60 2 API calls 82560->82561 82562 3dca4e 82561->82562 82563 3dbf60 2 API calls 82562->82563 82564 3dca66 82563->82564 82565 3dbf60 2 API calls 82564->82565 82565->82566 82566->82549 82567->82522 82568->82513 82569->82541 82570->82516 82571->82541 82572->82541 82573->82520 82574->82541 82575->82513 82576->82513 82577->82540 82579 3dbef4 82578->82579 82580 3dbf90 DeleteObject 82579->82580 82580->82553 82581 3d1d50 82582 3d1dd4 GetDC 82581->82582 82583 3d1d66 82581->82583 82585 3d1d8f 82582->82585 82584 3d1d6b CreateCompatibleDC SelectObject 82583->82584 82583->82585 82584->82585 82588 3d46c0 SelectPalette RealizePalette 82585->82588 82587 3d1d9b GetBkMode 82588->82587 82589 3e6a50 82591 3e6a75 82589->82591 82590 3e6af4 DefWindowProcA 82592 3e6ad0 82590->82592 82591->82592 82593 3e6ac1 GetCapture 82591->82593 82594 3e6ae4 82591->82594 82593->82592 82593->82594 82594->82590 82594->82592 82595 445234 82596 445240 82595->82596 82668 43db44 6 API calls 82596->82668 82598 445269 82599 46d508 6 API calls 82598->82599 82600 445381 82599->82600 82601 46d508 6 API calls 82600->82601 82602 4453e7 82601->82602 82603 44548b getenv 82602->82603 82604 4454c7 82603->82604 82669 43db44 6 API calls 82604->82669 82606 445544 82607 445558 getenv 82606->82607 82608 44556e 82607->82608 82670 48cca8 9 API calls 82608->82670 82610 445b9a 82699 468df4 fprintf fputc fflush abort 82610->82699 82612 445bab 82612->82612 82613 4455c8 82613->82610 82614 445b64 82613->82614 82619 445604 82613->82619 82696 468df4 fprintf fputc fflush abort 82614->82696 82616 445b70 82697 468df4 fprintf fputc fflush abort 82616->82697 82618 445b85 82698 468df4 fprintf fputc fflush abort 82618->82698 82671 49ec00 82619->82671 82623 445687 82624 445741 82623->82624 82692 468df4 fprintf fputc fflush abort 82623->82692 82676 4a1654 17 API calls 82624->82676 82626 445749 82677 47d0b8 17 API calls 82626->82677 82628 445751 82678 44500c 10 API calls 82628->82678 82630 445791 82679 44500c 10 API calls 82630->82679 82632 4457b9 82680 48cca8 9 API calls 82632->82680 82634 4457d9 82634->82618 82635 445808 strcpy 82634->82635 82638 44585d 82634->82638 82682 48ca88 11 API calls 82634->82682 82681 44500c 10 API calls 82635->82681 82683 48cca8 9 API calls 82638->82683 82640 44587d 82640->82616 82641 445885 82640->82641 82684 48ca88 11 API calls 82641->82684 82643 4458c0 strcpy 82685 44500c 10 API calls 82643->82685 82645 4458a1 82645->82643 82646 445b24 82645->82646 82649 44591c 82645->82649 82693 468df4 fprintf fputc fflush abort 82646->82693 82648 445b36 82694 4415d8 6 API calls 82648->82694 82686 460884 11 API calls 82649->82686 82652 445b44 82653 43dddc 4 API calls 82652->82653 82654 445b4c 82653->82654 82695 468df4 fprintf fputc fflush abort 82654->82695 82656 445acc 82690 468a84 12 API calls 82656->82690 82658 445aec 82659 445afc 82658->82659 82691 468df4 fprintf fputc fflush abort 82658->82691 82661 445924 82687 458f5c GetVersionExA GetSystemInfo wsprintfA 82661->82687 82663 445a34 82688 450454 6 API calls 82663->82688 82665 445a7c 82689 44500c 10 API calls 82665->82689 82667 445aa4 82667->82648 82667->82656 82668->82598 82669->82606 82670->82613 82672 469168 6 API calls 82671->82672 82673 49ec18 82672->82673 82674 49ec2a GetSystemInfo VirtualQuery 82673->82674 82675 49ec56 82673->82675 82674->82675 82675->82623 82676->82626 82677->82628 82678->82630 82679->82632 82680->82634 82681->82634 82682->82634 82683->82640 82684->82645 82685->82645 82686->82661 82687->82663 82688->82665 82689->82667 82690->82658 82691->82659 82692->82623 82693->82648 82694->82652 82695->82656 82696->82616 82697->82618 82698->82610 82699->82612 82700 4d883c 82701 4678e0 82700->82701 82702 4d885c GetFileAttributesW 82701->82702 82703 4d8aa3 GetLastError 82702->82703 82706 4d8873 82702->82706 82704 4d89bc 82703->82704 82705 4d89db 82728 465dfc _errno 82705->82728 82706->82704 82706->82705 82707 4d88a5 82706->82707 82707->82704 82709 4d88b5 GetFileSecurityW GetLastError 82707->82709 82710 4d8939 82709->82710 82711 4d89f0 GetProcessHeap HeapAlloc 82709->82711 82712 4d8a94 GetLastError 82711->82712 82713 4d8a16 GetFileSecurityW 82711->82713 82721 4d8a6d 82712->82721 82714 4d8954 GetSecurityDescriptorOwner 82713->82714 82715 4d8a44 GetLastError 82713->82715 82716 4d89a0 GetProcessHeap HeapFree 82714->82716 82717 4d8973 GetSidIdentifierAuthority memcmp 82714->82717 82718 4dcb64 82715->82718 82716->82704 82717->82716 82720 4d8aba ImpersonateSelf 82717->82720 82719 4d8a51 GetProcessHeap HeapFree 82718->82719 82719->82721 82720->82715 82723 4d8ad5 GetCurrentThread OpenThreadToken 82720->82723 82721->82704 82722 4d8a75 CloseHandle 82721->82722 82722->82704 82723->82715 82724 4d8b0d RevertToSelf 82723->82724 82725 4d8b2b 82724->82725 82725->82715 82726 4d8bab GetProcessHeap HeapFree CloseHandle 82725->82726 82726->82704 82727 4d8be1 82726->82727 82727->82727 82728->82704 82729 4d677c 82730 4d67b8 82729->82730 82731 4d6791 GetEnvironmentVariableW 82729->82731 82733 4d68c8 GetModuleHandleW 82730->82733 82738 4d67d2 82730->82738 82731->82730 82732 4d68b8 82731->82732 82734 4d68dd GetProcAddress 82733->82734 82741 4d686c 82733->82741 82735 4d68f8 GetTempPathW 82734->82735 82734->82741 82736 4d692b wcscpy GetCurrentProcessId 82735->82736 82737 4d6860 82735->82737 82740 4d6986 wsprintfW CreateDirectoryW 82736->82740 82755 465dfc _errno 82737->82755 82744 4d6821 GetTempFileNameW 82738->82744 82747 43dddc 4 API calls 82738->82747 82742 4d6958 GetLastError 82740->82742 82743 4d69b1 82740->82743 82756 465e10 10 API calls 82741->82756 82742->82741 82746 4d6968 82742->82746 82750 4d69c1 wcscpy 82743->82750 82748 4d684c 82744->82748 82746->82740 82746->82741 82751 4d67fe 82747->82751 82749 4d687b 82757 44c568 12 API calls 82749->82757 82750->82741 82751->82744 82753 4d688b 82758 441458 7 API calls 82753->82758 82755->82741 82756->82749 82757->82753 82758->82748 82759 4704f4 82762 470168 82759->82762 82761 470513 82764 47017e 82762->82764 82763 470284 82763->82761 82764->82763 82765 47033d GetProcessHeap HeapAlloc 82764->82765 82769 4d73ec 8 API calls 82764->82769 82766 470365 82765->82766 82766->82763 82767 4704b4 GetProcessHeap HeapFree 82766->82767 82768 470440 82766->82768 82767->82763 82768->82761 82769->82764 82770 501064 82772 50107a 82770->82772 82777 50112d 82772->82777 82784 509ca0 82772->82784 82788 509e6e 13 API calls 82772->82788 82789 53c9d0 82772->82789 82792 50c082 memcpy strlen 82772->82792 82775 5011c4 82781 50d3ba 82775->82781 82777->82775 82793 50caca malloc free realloc memset memmove 82777->82793 82779 501234 82794 53c9e8 82781->82794 82785 509cbc 82784->82785 82787 509cc8 82784->82787 82879 53e134 82785->82879 82787->82772 82788->82772 82790 53c898 13 API calls 82789->82790 82791 53c9e3 82790->82791 82791->82772 82792->82772 82793->82775 82797 53c898 82794->82797 82800 50798e 82797->82800 82801 5079b5 82800->82801 82802 5079cc 82800->82802 82801->82802 82804 5137c2 82801->82804 82802->82779 82807 513666 82804->82807 82806 5137d5 82806->82802 82808 513697 82807->82808 82813 513936 82808->82813 82810 5136c2 82812 51375d 82810->82812 82822 51d1fc 82810->82822 82812->82806 82814 513a9a 82813->82814 82817 513954 82813->82817 82814->82810 82817->82814 82818 513936 13 API calls 82817->82818 82826 514772 82817->82826 82830 526c88 82817->82830 82833 53b5ec 82817->82833 82836 5251b4 82817->82836 82839 50caca malloc free realloc memset memmove 82817->82839 82818->82817 82823 51d210 82822->82823 82825 51d271 82823->82825 82878 53c2a4 malloc free realloc memset 82823->82878 82825->82812 82827 514786 82826->82827 82840 51333c 82827->82840 82829 5147bc 82829->82817 82847 526bc4 82830->82847 82832 526c9b 82832->82817 82863 53b60c 82833->82863 82835 53b5ff 82835->82817 82837 525072 6 API calls 82836->82837 82838 5251c7 82837->82838 82838->82817 82839->82817 82843 5270da 82840->82843 82841 51336a 82841->82829 82844 5270f0 82843->82844 82846 5270fa 82843->82846 82845 526d38 10 API calls 82844->82845 82845->82846 82846->82841 82848 526be0 82847->82848 82849 526c0d 82848->82849 82853 527636 82848->82853 82859 514c7c 82849->82859 82852 526c27 82852->82832 82855 527652 82853->82855 82854 52769b 82854->82848 82855->82854 82856 513936 13 API calls 82855->82856 82857 527680 82856->82857 82858 50798e 13 API calls 82857->82858 82858->82854 82860 514c90 82859->82860 82861 515d1e memcpy memmove 82860->82861 82862 514ca4 82861->82862 82862->82852 82866 525072 82863->82866 82865 53b628 82865->82835 82872 52508e 82866->82872 82867 5250d8 82868 53c48c malloc free realloc memset 82867->82868 82869 5250f6 82868->82869 82871 514c7c memcpy memmove 82869->82871 82870 514c7c memcpy memmove 82870->82872 82873 525103 82871->82873 82872->82867 82872->82870 82874 53c334 memcpy memmove 82873->82874 82875 525110 82874->82875 82876 514c7c memcpy memmove 82875->82876 82877 52511d 82876->82877 82877->82865 82878->82825 82880 53e140 82879->82880 82881 53e14f malloc 82879->82881 82880->82881 82883 53e160 82880->82883 82881->82880 82882 53e15b 82881->82882 82882->82787 82884 50de24 82895 51dd70 82884->82895 82887 50de42 82888 509ca0 malloc 82889 50de56 82888->82889 82914 50da36 82889->82914 82891 50de8e 82921 50a2a8 82891->82921 82893 50dea9 82894 53c9d0 13 API calls 82893->82894 82894->82887 82896 51dd7f 82895->82896 82897 50de39 82896->82897 82898 53e134 malloc 82896->82898 82897->82887 82897->82888 82902 51ddee 82898->82902 82899 53e134 malloc 82900 51defc 82899->82900 82925 51d112 malloc 82900->82925 82902->82899 82903 51df1b 82904 53e134 malloc 82903->82904 82905 51df2d 82904->82905 82906 51df92 82905->82906 82907 51dfb0 82905->82907 82908 50798e 13 API calls 82906->82908 82926 515ec8 82907->82926 82913 51dfa6 82908->82913 82910 51dff4 82930 51412c 82910->82930 82911 514c7c 2 API calls 82911->82897 82913->82911 83004 50dbb6 82914->83004 82916 50da52 82917 53e134 malloc 82916->82917 82920 50daf2 82916->82920 82918 50dadb 82917->82918 82919 51e244 9 API calls 82918->82919 82919->82920 82920->82891 82923 50a2bc 82921->82923 82922 50a346 82922->82893 82923->82922 83011 53c8ec 82923->83011 82925->82903 82929 515efb 82926->82929 82927 515f2b 82927->82910 82928 515f63 memcpy 82928->82929 82929->82927 82929->82928 82932 514147 82930->82932 82934 5142c9 82930->82934 82931 514208 82931->82934 82940 525468 82931->82940 82932->82931 82948 53cec8 memcpy 82932->82948 82934->82913 82935 51418d 82936 53e134 malloc 82935->82936 82937 5141f1 82936->82937 82949 51e244 82937->82949 82941 525479 82940->82941 82967 525c4c 82941->82967 82943 5254e4 82944 515ec8 memcpy 82943->82944 82945 5255f0 82943->82945 82947 52553d 82944->82947 82945->82931 82946 53e134 malloc 82946->82947 82947->82945 82947->82946 82948->82935 82950 51e259 82949->82950 82985 53cef0 82950->82985 82953 51e313 82994 53cec8 memcpy 82953->82994 82954 51e2ac 82954->82953 82956 51e2bb 82954->82956 82992 53cec8 memcpy 82956->82992 82957 51e32c 82995 50c082 memcpy strlen 82957->82995 82960 51e2dd 82993 50c082 memcpy strlen 82960->82993 82962 51e3b4 82962->82931 82963 53e134 malloc 82966 51e2f3 82963->82966 82964 51e244 7 API calls 82964->82966 82966->82962 82966->82963 82966->82964 82988 50ca10 82966->82988 82968 525c5f 82967->82968 82971 53c40c 82968->82971 82970 525cd1 82970->82943 82972 53c420 82971->82972 82975 50c702 82972->82975 82976 50c729 82975->82976 82982 50c751 82975->82982 82978 50c758 82976->82978 82979 50c73e 82976->82979 82977 50c7da 82977->82970 82980 50c772 realloc 82978->82980 82981 50c75e free 82978->82981 82979->82982 82983 50c744 malloc 82979->82983 82980->82982 82981->82982 82982->82977 82984 50c7c3 memset 82982->82984 82983->82982 82984->82977 82996 50c196 82985->82996 82987 51e266 strcspn strchr 82987->82953 82987->82954 82989 50ca23 82988->82989 83000 50c7e2 82989->83000 82991 50ca3f 82991->82966 82992->82960 82993->82966 82994->82957 82995->82966 82997 50c1a5 82996->82997 82998 50c1ab 82996->82998 82997->82998 82999 50c213 memcpy 82997->82999 82998->82987 82999->82998 83001 50c7f6 83000->83001 83002 50c806 83000->83002 83003 50c702 4 API calls 83001->83003 83002->82991 83003->83002 83005 50dbcf 83004->83005 83006 50dbc6 83004->83006 83005->82916 83006->83005 83010 50962a malloc 83006->83010 83008 50dc07 83009 53c9d0 13 API calls 83008->83009 83009->83005 83010->83008 83012 53c8ff 83011->83012 83015 507b34 83012->83015 83014 53c917 83014->82923 83017 507b4b 83015->83017 83016 51333c 10 API calls 83016->83017 83017->83016 83018 507c8b 83017->83018 83020 527136 83017->83020 83018->83014 83021 52714c 83020->83021 83023 527156 83020->83023 83039 526d38 83021->83039 83024 527199 83023->83024 83026 5271a0 83023->83026 83024->83017 83027 5271b7 83026->83027 83029 5271c1 83026->83029 83028 526d38 10 API calls 83027->83028 83028->83029 83030 513936 13 API calls 83029->83030 83033 527373 83029->83033 83034 52721f 83029->83034 83031 527210 83030->83031 83032 50798e 13 API calls 83031->83032 83032->83034 83033->83024 83034->83033 83035 527136 16 API calls 83034->83035 83045 508866 83034->83045 83049 5260a6 83034->83049 83052 52692e 83034->83052 83035->83034 83040 526d56 83039->83040 83041 515ec8 memcpy 83040->83041 83042 526e2a 83040->83042 83043 526d9f 83041->83043 83042->83023 83043->83042 83044 51412c 10 API calls 83043->83044 83044->83043 83046 508880 83045->83046 83047 51333c 10 API calls 83046->83047 83048 50888c 83046->83048 83047->83048 83048->83034 83059 525e2e 83049->83059 83051 5260ce 83051->83034 83054 526942 83052->83054 83053 526992 83056 525e2e 10 API calls 83053->83056 83054->83053 83055 52695a 83054->83055 83057 525e2e 10 API calls 83055->83057 83058 526983 83056->83058 83057->83058 83058->83034 83060 525e48 83059->83060 83061 525f58 83060->83061 83062 525f3c 83060->83062 83064 525f53 83061->83064 83080 5159b0 8 API calls 83061->83080 83070 5157d8 83062->83070 83067 525f84 83064->83067 83081 515fac 83064->83081 83067->83051 83068 525faf 83068->83067 83085 50c972 malloc free realloc memset memmove 83068->83085 83071 5157ed 83070->83071 83086 5155c2 memcpy memmove memcpy 83071->83086 83073 515969 83089 515d1e 83073->83089 83075 5159a6 83075->83064 83076 515821 83076->83073 83087 50ca64 malloc free realloc memset memmove 83076->83087 83078 5158cd 83078->83073 83088 515258 memcpy memmove 83078->83088 83080->83064 83082 515fc0 83081->83082 83083 51604f 83082->83083 83084 516018 memcpy 83082->83084 83083->83068 83084->83082 83085->83067 83086->83076 83087->83078 83088->83073 83090 515d31 83089->83090 83092 515db7 83090->83092 83093 515258 memcpy memmove 83090->83093 83092->83075 83093->83092 83094 4d9a78 83095 4678e0 83094->83095 83096 4d9ad6 GetFileAttributesW 83095->83096 83097 4d9aed CreateFileW 83096->83097 83099 4d9b9c GetLastError 83097->83099 83100 4d9b42 SetFileTime 83097->83100 83103 4d9b74 83099->83103 83101 4d9b69 83100->83101 83102 4d9b88 GetLastError 83100->83102 83104 4d9b6b CloseHandle 83101->83104 83102->83101 83104->83103 83105 451730 83106 451755 83105->83106 83107 451830 83105->83107 83150 4b5dd4 83106->83150 83110 451776 83111 43dddc 4 API calls 83112 451793 83111->83112 83113 4517f6 83112->83113 83116 43dddc 4 API calls 83112->83116 83114 451805 83113->83114 83115 451889 83113->83115 83158 441398 strcpy 83114->83158 83118 43dddc 4 API calls 83115->83118 83129 451892 83115->83129 83116->83113 83119 451e56 83118->83119 83159 461130 7 API calls 83119->83159 83121 4519cb strcmp 83121->83129 83149 4519e5 83121->83149 83122 451a88 83123 45217a 83122->83123 83124 451aad 83122->83124 83125 451ea0 83122->83125 83127 43dddc 4 API calls 83124->83127 83142 451ab5 83124->83142 83160 4417b8 6 API calls 83125->83160 83134 452039 83127->83134 83128 451955 strcmp 83128->83129 83129->83121 83129->83122 83129->83124 83129->83128 83130 45198a strcmp 83129->83130 83135 451ecb 83129->83135 83141 451824 83129->83141 83129->83149 83130->83129 83131 43dbac 7 API calls 83131->83134 83134->83131 83137 4520b0 _isctype 83134->83137 83139 4520dd 83134->83139 83164 4417b8 6 API calls 83134->83164 83161 4417b8 6 API calls 83135->83161 83137->83134 83138 451d9c 83138->83141 83162 4417b8 6 API calls 83138->83162 83140 43dbac 7 API calls 83139->83140 83139->83142 83140->83142 83142->83141 83143 451fa8 83142->83143 83145 451cbf 83142->83145 83163 4417b8 6 API calls 83143->83163 83146 451ce4 strcpy 83145->83146 83147 44e344 83146->83147 83148 451d06 strcpy 83147->83148 83148->83149 83149->83135 83149->83138 83149->83141 83151 4b5de5 83150->83151 83154 4b5e04 83150->83154 83165 43daec fprintf fputc fflush abort 83151->83165 83153 451772 83153->83110 83153->83111 83154->83153 83155 4b5e1d 83154->83155 83167 4b5848 9 API calls 83154->83167 83166 4b55e0 7 API calls 83155->83166 83159->83129 83160->83135 83161->83141 83162->83141 83163->83141 83164->83134 83165->83153 83166->83151 83167->83155 83168 361000 83169 36100d 83168->83169 83170 361029 SetUnhandledExceptionFilter 83168->83170 83169->83170 83171 36103d 83170->83171 83172 361042 __getmainargs 83171->83172 83173 3610c2 __p__fmode 83172->83173 83174 361080 _setmode _setmode _setmode 83172->83174 83192 534bc0 83173->83192 83174->83173 83176 3610d4 83177 3610dc __p__environ 83176->83177 83178 53f910 83177->83178 83179 3610fd _cexit ExitProcess 83178->83179 83180 361123 83179->83180 83181 361160 83179->83181 83182 361177 83180->83182 83183 36112a 83180->83183 83181->83183 83185 361185 signal 83181->83185 83186 3611c0 signal 83182->83186 83187 36117e 83182->83187 83184 36112f signal 83183->83184 83191 36114c 83183->83191 83189 361240 signal 83184->83189 83184->83191 83188 361207 signal 83185->83188 83185->83191 83190 361223 signal 83186->83190 83186->83191 83187->83185 83187->83191 83188->83191 83189->83191 83190->83191 83193 534bc9 83192->83193 83195 534bd0 83192->83195 83193->83176 83194 534c94 83196 534ca1 83194->83196 83197 534ccf 83194->83197 83195->83193 83195->83194 83198 534d84 83195->83198 83201 534c3d 83195->83201 83196->83197 83208 534ab0 13 API calls 83196->83208 83197->83176 83209 534a50 13 API calls 83198->83209 83201->83197 83203 534c7c 83201->83203 83205 534d07 83201->83205 83202 534ab0 13 API calls 83202->83205 83207 534a50 13 API calls 83203->83207 83205->83201 83205->83202 83206 534d94 83206->83176 83207->83194 83208->83196 83209->83206 83210 4aef3c 83211 4aef52 83210->83211 83230 459288 83211->83230 83213 4aef69 83214 4aef74 __p__environ 83213->83214 83229 4af0bb 83213->83229 83237 45c198 83214->83237 83216 4aefa1 strcmp 83217 4aefc7 83216->83217 83220 4af12c 83216->83220 83218 4aefcc __p__environ 83217->83218 83219 44e344 83218->83219 83221 4aeffe strcpy strcpy 83219->83221 83222 4af04e 83221->83222 83223 4af06d strcpy 83222->83223 83224 45e88c 83223->83224 83225 4af087 _putenv 83224->83225 83226 459288 3 API calls 83225->83226 83227 4af0a2 83226->83227 83228 4af0a9 __p__environ 83227->83228 83227->83229 83228->83229 83231 4592b2 83230->83231 83232 4592d0 __p__environ 83231->83232 83234 45936a 83232->83234 83236 4592e3 83232->83236 83233 459300 strchr 83235 459357 __p__environ 83233->83235 83233->83236 83234->83213 83235->83234 83235->83236 83236->83233 83236->83234 83236->83235 83238 45c1af 83237->83238 83238->83216 83239 409738 GetWindowLongA 83241 40979c 83239->83241 83243 40975f 83239->83243 83240 40976d DefWindowProcA 83241->83240 83242 4097bc GetSysColor 83241->83242 83241->83243 83242->83241 83243->83240 83244 4d9e74 83245 4678e0 83244->83245 83246 4d9e87 GetFileAttributesW 83245->83246 83247 4d9ef4 83246->83247 83250 4d9e9c 83246->83250 83253 4d9e10 11 API calls 83247->83253 83249 4d9eff 83251 4d9ee9 83250->83251 83252 4d9ed3 SetFileAttributesW 83250->83252 83252->83247 83252->83251 83253->83249 83254 3e0844 83255 3e0868 83254->83255 83256 3e08b3 sprintf 83255->83256 83257 3e0b6c 83255->83257 83258 3e0bb4 83255->83258 83259 3e0aa8 83255->83259 83261 3e0960 83255->83261 83264 3e08f0 83256->83264 83257->83261 83283 3cd3ec _strnicmp _stricmp GetSysColor GetVersion 83257->83283 83258->83261 83267 3917e0 83258->83267 83259->83261 83265 3e0ff4 83259->83265 83266 3e0af7 strcpy 83259->83266 83261->83264 83284 3e065c 7 API calls 83261->83284 83266->83261 83268 391807 83267->83268 83269 3918c9 83268->83269 83270 391a48 83268->83270 83282 391883 83268->83282 83285 3dcae0 83269->83285 83299 3dc800 GetStockObject 83270->83299 83272 3918e5 83272->83282 83298 3dce6c 17 API calls 83272->83298 83275 391a62 83275->83272 83276 391a6c 83275->83276 83277 391c74 strchr 83276->83277 83278 391aae 83276->83278 83277->83278 83281 391ab6 83277->83281 83280 391e4b _isctype 83278->83280 83278->83281 83300 3913dc atoi atoi atoi 83278->83300 83280->83281 83281->83280 83281->83282 83282->83261 83283->83261 83284->83265 83286 3dcb04 GetDC 83285->83286 83288 3dcb2d ReleaseDC 83286->83288 83289 3dcb22 83286->83289 83291 3dcb57 83288->83291 83305 3db334 _stricmp 83289->83305 83292 3dcb75 83291->83292 83301 3dbea0 83291->83301 83292->83272 83293 3dcb29 83293->83288 83295 3dcc06 _stricmp 83293->83295 83296 3dcbb3 83293->83296 83297 3db334 9 API calls 83293->83297 83295->83293 83296->83288 83297->83293 83298->83282 83299->83275 83300->83281 83302 3dbed6 83301->83302 83304 3dbeb0 83301->83304 83302->83292 83303 3dbeb4 DeleteObject 83303->83304 83304->83302 83304->83303 83306 3db364 _stricmp 83305->83306 83313 3db355 83305->83313 83307 3db378 _stricmp 83306->83307 83306->83313 83308 3db38c 83307->83308 83307->83313 83309 394270 4 API calls 83308->83309 83310 3db3b8 83309->83310 83311 3db3d8 EnumFontFamiliesA 83310->83311 83312 3db400 EnumFontFamiliesW 83310->83312 83311->83313 83312->83313 83313->83293 83314 46f73c ReadFile 83315 46f780 83314->83315 83316 46f78c GetLastError 83314->83316 83317 4dcb64 83316->83317 83318 46f799 _errno _errno 83317->83318 83319 46f1bc 83320 46f1db SetFilePointer 83319->83320 83322 46f220 GetLastError 83320->83322 83323 46f210 83320->83323 83322->83323 83324 46f229 83322->83324 83325 46f231 _errno 83324->83325 83325->83323 83326 435d38 83330 435d55 83326->83330 83327 435ed0 83330->83327 83331 435be8 83330->83331 83337 468df4 fprintf fputc fflush abort 83330->83337 83338 435b9c 83331->83338 83333 435c01 83333->83330 83334 435bfd 83334->83333 83345 4fff71 83334->83345 83348 465dfc _errno 83334->83348 83337->83330 83339 435ba1 83338->83339 83340 435ba4 83338->83340 83339->83334 83349 465dfc _errno 83340->83349 83342 435bb7 83343 435bd7 83342->83343 83350 4417b8 6 API calls 83342->83350 83343->83334 83351 53bd30 83345->83351 83348->83334 83349->83342 83350->83343 83354 53bd41 83351->83354 83352 4fffa4 83352->83334 83354->83352 83355 53bdf2 memcpy 83354->83355 83356 50905c 83354->83356 83355->83354 83357 509078 83356->83357 83360 50914c 83357->83360 83362 525260 83357->83362 83358 509136 83359 515ec8 memcpy 83358->83359 83358->83360 83359->83360 83360->83354 83363 52528f 83362->83363 83364 53e134 malloc 83363->83364 83369 525377 83363->83369 83365 5252cb 83364->83365 83366 515ec8 memcpy 83365->83366 83365->83369 83367 525349 83366->83367 83368 515fac memcpy 83367->83368 83368->83369 83369->83358 83370 399507 83372 399515 83370->83372 83371 39916a 83372->83371 83373 399b9d 83372->83373 83377 3e4bc4 83372->83377 83394 3edab0 17 API calls 83373->83394 83376 39a065 83376->83376 83378 3e4bea 83377->83378 83379 3e4d4c 83378->83379 83380 3e4c19 83378->83380 83395 3e3ab0 83379->83395 83381 3e4d40 83380->83381 83384 3e4c3e 83380->83384 83381->83373 83383 3e4d6a 83386 3e4d70 GetAsyncKeyState 83383->83386 83407 37cd0c ClientToScreen 83384->83407 83388 3e4cb1 TrackPopupMenu 83386->83388 83387 3e4c56 GetSystemMetrics 83387->83386 83392 3e4c9b GetAsyncKeyState 83387->83392 83391 3e4cff GetCursorPos 83388->83391 83393 3e4d28 83391->83393 83392->83388 83393->83373 83394->83376 83396 3e3ebd 83395->83396 83397 3e3ad3 GetMenuItemCount 83395->83397 83396->83383 83398 3e3aff 83397->83398 83402 3e3b20 83397->83402 83399 3e3b04 RemoveMenu 83398->83399 83399->83399 83399->83402 83400 3e3eac 83400->83396 83401 3e40e9 DrawMenuBar 83400->83401 83401->83396 83402->83400 83403 3e3dd5 strcpy 83402->83403 83404 3e3d55 83402->83404 83405 3e4126 DestroyMenu GetSystemMenu 83402->83405 83403->83400 83404->83383 83405->83403 83407->83387

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 726 3789e4-378a12 728 378a14-378a22 726->728 729 378a29-378a31 726->729 728->729 730 378a33-378a3f 729->730 731 378a40-378a5a 729->731 733 378b32-378b50 731->733 734 378a60-378a72 731->734 735 378b94-378ba5 LoadLibraryA 734->735 736 378a78-378a80 734->736 735->736 737 378bab-378bcc GetProcAddress FreeLibrary 735->737 739 378a86-378ad7 call 39423c 736->739 740 378bd4-378be5 LoadLibraryA 736->740 737->736 745 378add-378aef call 378164 739->745 746 378b68-378b84 call 39423c LoadIconA 739->746 740->739 742 378beb-378c0c GetProcAddress FreeLibrary 740->742 742->739 752 378af5 745->752 753 378b8c 745->753 751 378af8-378b22 LoadCursorA 746->751 755 378b54-378b63 751->755 756 378b24-378b27 751->756 752->751 753->735 755->756 756->733
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$AddressCursorFreeProc
                                  • String ID: @uT$SHGetFileInfo$SetLayeredWindowAttributes$TkTopLevel$Unable to register TkTopLevel class$shell32$user32
                                  • API String ID: 3475610206-2532500893
                                  • Opcode ID: 384143de77e3a5f1304e256f7777e866775f7aa1d8646dbff0b549c59916afbb
                                  • Instruction ID: 174a6730d2713f979548adc9b887a51634e5dfa43f39b16578b45ac6888772b0
                                  • Opcode Fuzzy Hash: 384143de77e3a5f1304e256f7777e866775f7aa1d8646dbff0b549c59916afbb
                                  • Instruction Fuzzy Hash: B0519EB1104341CFD355AF64D89C62ABFF4BF84311F05892EE8D89B261EB78C848DB52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 794 361000-36100b 795 36100d-361026 794->795 796 361029-36107e SetUnhandledExceptionFilter call 534960 call 534a40 __getmainargs 794->796 795->796 802 3610c2-3610f8 __p__fmode call 534bc0 call 534e20 __p__environ call 53f910 796->802 803 361080-3610bd _setmode * 3 796->803 809 3610fd-361121 _cexit ExitProcess 802->809 803->802 810 361123-361128 809->810 811 361160-361165 809->811 812 361177-36117c 810->812 813 36112a 810->813 814 361167-36116c 811->814 815 3611b2-3611b4 811->815 819 3611c0-3611d7 signal 812->819 820 36117e-361183 812->820 816 36112f-361146 signal 813->816 817 361185-36119c signal 814->817 818 36116e-361173 814->818 815->816 823 361240-36125b signal 816->823 824 36114c-36114e 816->824 821 361207-36121e signal 817->821 822 36119e-3611a0 817->822 827 361154 818->827 828 361175 818->828 825 361223-36123a signal 819->825 826 3611d9-3611db 819->826 820->817 820->827 829 361156-36115a 821->829 822->827 831 3611a2-3611b0 822->831 823->829 830 361261-36126e call 534a40 823->830 824->827 832 3611f4-361202 824->832 825->829 826->827 833 3611e1-3611ef 826->833 827->829 828->813 830->829 831->829 832->829 833->829
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _setmode$ExceptionExitFilterProcessUnhandled__getmainargs__p__environ__p__fmode_cexitsignal
                                  • String ID:
                                  • API String ID: 2967348641-0
                                  • Opcode ID: 46660eaa2152e4e6730be22dd0000d4e769693801d7ef310af4ff0e37b7623aa
                                  • Instruction ID: 15d93d74f7c02046639447247d9178db9f37547714b3a9d4d6f13d6dd986c062
                                  • Opcode Fuzzy Hash: 46660eaa2152e4e6730be22dd0000d4e769693801d7ef310af4ff0e37b7623aa
                                  • Instruction Fuzzy Hash: 9A51F7B05083418FD711AF78C98931EBBE4BB8A314F158E19E5E8CB395E779D8849B43

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 963 4d8e1c-4d8e49 call 45e74c call 43dddc call 49ebd0 970 4d922c-4d923a 963->970 971 4d8e4f-4d8e5d 963->971 972 4d94a1-4d94a4 970->972 973 4d9240-4d9252 970->973 974 4d942c-4d942f 971->974 975 4d8e63-4d8e81 971->975 980 4d94aa-4d94b4 GetFileAttributesA 972->980 976 4d92f7-4d92fa 973->976 981 4d9438-4d944e call 43dbac 974->981 977 4d8e84-4d8e87 975->977 978 4d92fc-4d92fe 976->978 979 4d9300-4d9302 976->979 982 4d8e89-4d8e8b 977->982 983 4d8e91-4d8e93 977->983 978->979 986 4d92f4-4d92f5 978->986 979->986 987 4d9304-4d9334 call 45c3f8 979->987 989 4d94ba-4d94d6 call 45e768 980->989 990 4d9411-4d9418 call 45e88c 980->990 982->983 985 4d8ffa-4d8ffd 982->985 984 4d8e99-4d8ee2 call 49f21c 983->984 983->985 1011 4d8ee8-4d8eea 984->1011 1012 4d9104-4d910c 984->1012 985->977 986->976 1000 4d9258-4d925c 987->1000 1001 4d933a-4d934c GetFileAttributesA 987->1001 1002 4d94db-4d94e3 call 43dbac 989->1002 997 4d941d 990->997 997->974 1004 4d9380-4d9385 1000->1004 1005 4d9262-4d9283 FindFirstFileA 1000->1005 1006 4d93d4-4d93e3 call 4d6b34 1001->1006 1007 4d9352-4d9356 1001->1007 1030 4d90bf-4d90f0 call 45e88c call 45e74c call 45e88c 1002->1030 1009 4d9395-4d9398 1004->1009 1010 4d9387 1004->1010 1005->980 1013 4d9289-4d9291 1005->1013 1006->990 1036 4d93e5-4d93e7 1006->1036 1015 4d935d-4d9378 call 45e768 1007->1015 1016 4d9358-4d935b 1007->1016 1019 4d939a-4d939c 1009->1019 1022 4d938c-4d938f 1009->1022 1010->1019 1020 4d8f9c-4d8f9e 1011->1020 1021 4d8ef0-4d8ef2 1011->1021 1023 4d944f-4d9460 call 4d6b34 1012->1023 1024 4d9112-4d9119 call 45e88c 1012->1024 1025 4d93c8 1013->1025 1026 4d9297-4d92db FindClose call 45e768 * 2 1013->1026 1042 4d92dc-4d92ec call 45e88c 1015->1042 1016->1015 1019->1005 1033 4d93a2-4d93c3 call 45e768 1019->1033 1031 4d8fa4-4d8fac 1020->1031 1032 4d8f03-4d8f0b 1020->1032 1021->1031 1034 4d8ef8-4d8efd 1021->1034 1022->1005 1022->1009 1023->1024 1054 4d9466-4d946e 1023->1054 1048 4d911e-4d9120 1024->1048 1025->1006 1026->1042 1030->977 1040 4d8fae-4d8fb1 1031->1040 1041 4d8fb5-4d8fc0 1031->1041 1046 4d9004-4d9007 1032->1046 1047 4d8f11-4d8f32 FindFirstFileW 1032->1047 1033->1042 1034->1032 1044 4d9040-4d9053 call 4d6d2c 1034->1044 1039 4d93ea-4d93ef 1036->1039 1050 4d93f6-4d93f9 1039->1050 1051 4d93f1-4d93f4 1039->1051 1040->1041 1056 4d8fc4-4d8fd4 call 45e768 1041->1056 1042->997 1082 4d92f2 1042->1082 1044->1032 1083 4d9059-4d9079 call 44c154 call 43dddc 1044->1083 1063 4d9009 1046->1063 1064 4d9015-4d9018 1046->1064 1060 4d8f38-4d8f41 1047->1060 1061 4d94f5-4d9511 call 45e768 1047->1061 1052 4d91c4-4d91d6 call 45e88c 1048->1052 1053 4d9126-4d9151 call 49f248 1048->1053 1050->1039 1069 4d93fb-4d940f call 45e768 1050->1069 1051->1050 1096 4d91ef-4d91fd 1052->1096 1097 4d91d8-4d91e9 1052->1097 1091 4d9157-4d91b2 call 44b7ec call 44c154 call 43e030 call 44badc 1053->1091 1092 4d9200-4d9222 call 44badc 1053->1092 1076 4d9470-4d9477 1054->1076 1099 4d8fd8-4d8fee call 45e88c 1056->1099 1073 4d90f8 1060->1073 1074 4d8f47-4d8f72 FindClose call 45e768 1060->1074 1067 4d901a-4d901c 1063->1067 1066 4d900c-4d900f 1064->1066 1064->1067 1066->1047 1066->1064 1067->1047 1080 4d9022-4d903d 1067->1080 1069->990 1073->1012 1095 4d8f77-4d8f99 wcslen call 45e768 1074->1095 1087 4d947f-4d9484 1076->1087 1088 4d9479-4d947c 1076->1088 1080->1056 1082->986 1120 4d907b 1083->1120 1121 4d9087-4d908a 1083->1121 1087->1076 1098 4d9486-4d949c call 45e768 1087->1098 1088->1087 1116 4d91b8-4d91bf call 45e88c 1091->1116 1133 4d94e8-4d94f0 call 43dbac 1091->1133 1092->1116 1095->1099 1097->981 1097->1096 1098->1024 1117 4d9224-4d9226 1099->1117 1118 4d8ff4-4d8ff8 1099->1118 1116->1052 1117->1048 1118->985 1124 4d9096-4d90a6 call 43dddc 1120->1124 1125 4d908c-4d9094 1121->1125 1126 4d9080-4d9085 1121->1126 1124->1030 1132 4d90a8-4d90b9 1124->1132 1125->1121 1125->1124 1126->1121 1126->1124 1132->1002 1132->1030 1133->1116
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: FileFind$AttributesCloseFirstwcslen
                                  • String ID: /$/
                                  • API String ID: 1899512432-2523464752
                                  • Opcode ID: 3c0c2ac417b6c1406c5d5e60656757bdd4e4918ed7f91a117e6d89cd144609a9
                                  • Instruction ID: ffda764e6566b5db931cac6864b718058e4d8aa1673bb22eeabb207b0a0c2b84
                                  • Opcode Fuzzy Hash: 3c0c2ac417b6c1406c5d5e60656757bdd4e4918ed7f91a117e6d89cd144609a9
                                  • Instruction Fuzzy Hash: CF1246745083819ED724EF29C19426EBBE1AF89708F14896FE8C8C7342D778D949CB4B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb2f09a2cefd5be507c45692072a55e97ab025e1ed395ba9f6214fa14d3cb8f4
                                  • Instruction ID: 06c7ce9f818c7a80de96e6ef7a3565828532744ec7fada3804a40d938a588783
                                  • Opcode Fuzzy Hash: bb2f09a2cefd5be507c45692072a55e97ab025e1ed395ba9f6214fa14d3cb8f4
                                  • Instruction Fuzzy Hash: C1B16A76609705CFD724CF59C48469BBBE0FF88304F188A6ED9998B311E374EA45CB86
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: InfoQuerySystemVirtual
                                  • String ID:
                                  • API String ID: 401686933-0
                                  • Opcode ID: 29bd8a40c3648db53381c088683dec1fd97da0af27e31e815a30a060695bdb9b
                                  • Instruction ID: 8fe676fa274be883588edc7333b4edd7b1c0b4e4a0d5c577ead443d4b5137ea3
                                  • Opcode Fuzzy Hash: 29bd8a40c3648db53381c088683dec1fd97da0af27e31e815a30a060695bdb9b
                                  • Instruction Fuzzy Hash: BE11C0B4608306CFDB10DF29C485A5ABBE4BF89704F54896AF898C7314E378E849CF52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 37a1a8-37a1e0 2 37a1e6-37a1f8 GetFocus 0->2 3 37a930-37a938 call 364350 0->3 4 37a203 2->4 5 37a1fa-37a201 GetForegroundWindow 2->5 15 37a940-37a965 SendMessageA 3->15 7 37a20b-37a212 4->7 5->4 5->7 9 37a394-37a39c 7->9 10 37a218-37a223 7->10 11 37aa24-37aa4c GetDesktopWindow 9->11 12 37a3a2-37a3ab 9->12 13 37ab25-37ab34 10->13 14 37a229-37a234 IsWindow 10->14 20 37aa52-37aa69 11->20 21 37ab6c-37ab7e 11->21 16 37a3b1-37a3b6 12->16 17 37a9d8-37a9e7 12->17 39 37ab3c-37ab54 13->39 18 37aa6c-37aa7b 14->18 19 37a23a 14->19 22 37a967-37a977 call 37a118 15->22 23 37a97e-37a98f call 376b64 15->23 27 37ab0c-37ab20 16->27 28 37a3bc-37a3ef call 376940 16->28 30 37a9ef-37aa0c 17->30 18->19 29 37a242-37a268 SetWindowLongA 19->29 20->30 22->23 35 37a994-37a9b0 SetWindowLongA 23->35 27->30 28->39 45 37a3f5-37a41e 28->45 29->35 36 37a26e-37a286 SetParent 29->36 37 37aa12-37aa1e 30->37 38 37a420-37a458 call 378408 30->38 44 37a9b8-37a9d5 SetActiveWindow 35->44 41 37a28c-37a2dd SendMessageA * 2 36->41 42 37a918-37a928 36->42 37->38 52 37aac0-37aac4 38->52 53 37a45e-37a49d 38->53 39->37 46 37a2e3-37a2ea GetDesktopWindow 41->46 47 37a6ac-37a6bc 41->47 42->3 45->38 46->47 51 37a2f0-37a313 SetWindowLongA 46->51 49 37a6c2-37a6d2 47->49 50 37a88e-37a8b6 SendMessageA 47->50 59 37a6d4-37a70f SetWindowPos 49->59 60 37a712-37a727 call 37a118 49->60 50->49 56 37a8bc-37a912 SendMessageA call 3e7374 SendMessageA 50->56 61 37a85c 51->61 62 37a319-37a334 51->62 57 37aac6-37aac8 52->57 58 37aae0-37aaea 52->58 54 37ab04 53->54 55 37a4a3-37a5b8 call 39423c CreateWindowExW SetWindowLongA 53->55 54->27 102 37aa80-37aa9c 55->102 103 37a5be-37a5c6 55->103 56->49 57->58 65 37aaca-37aad2 57->65 70 37aaf4-37aafc call 39e3e8 58->70 59->60 73 37a74f-37a755 60->73 74 37a729-37a74c SendMessageA 60->74 63 37a85e-37a888 SetMenu DestroyWindow 61->63 62->63 72 37a33a-37a33c 62->72 63->49 63->50 65->58 70->54 76 37a34e-37a351 72->76 78 37a757-37a77a SendMessageA 73->78 79 37a77d-37a784 73->79 74->73 81 37a353-37a35a 76->81 82 37a340-37a348 76->82 78->79 79->15 84 37a78a-37a792 79->84 81->82 85 37a35c-37a38f SetParent 81->85 82->63 82->76 87 37a7b4-37a7b6 84->87 88 37a794-37a7ad SetMenu 84->88 85->82 89 37a82b-37a834 87->89 90 37a7b8-37a7c0 87->90 88->87 89->44 94 37a83a-37a840 89->94 91 37a7c2-37a7cd 90->91 92 37a820-37a823 90->92 91->92 97 37a7cf-37a7d1 91->97 92->89 95 37a842-37a84e SetFocus 94->95 96 37a84f-37a859 94->96 95->96 98 37a7de-37a7e1 97->98 100 37a7d4-37a7dc 98->100 101 37a7e3-37a7ea 98->101 100->92 100->98 101->100 106 37a7ec-37a7f2 call 37a1a8 101->106 104 37aaa2-37aaa9 102->104 105 37a62b-37a66a GetWindowPlacement 102->105 103->102 107 37a5cc-37a628 103->107 109 37aaaf-37aab9 104->109 110 37ab59-37ab67 104->110 105->70 108 37a670-37a672 105->108 113 37a7f7-37a81e call 37a118 106->113 107->105 108->19 112 37a678-37a67b 108->112 109->105 110->109 112->19 115 37a681-37a688 112->115 113->92 113->98 115->19 118 37a68e-37a6a5 GetWindow 115->118 118->29
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Window$LongMessageParentSend$DesktopFocusForeground
                                  • String ID: ,$@uT$TkTopLevel$UpdateWrapper: Cannot find container window$UpdateWrapper: Container was destroyed
                                  • API String ID: 2981412878-2369555602
                                  • Opcode ID: 28b2fa0a29ffdf10ad6396a2521cb75a3d09041d3986988b288b90924578f7b1
                                  • Instruction ID: 72e3916c07dc1967359795369ae978d54db3d6033b8bc8a6ee50ad15a47eb59e
                                  • Opcode Fuzzy Hash: 28b2fa0a29ffdf10ad6396a2521cb75a3d09041d3986988b288b90924578f7b1
                                  • Instruction Fuzzy Hash: F642DEB45087018FE765EF28C588B6ABBF0BB84300F15C96DE8988B356E779D845CB52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 120 451730-45174f 121 451755-451774 call 4b5dd4 120->121 122 451830-45186b call 44e928 120->122 127 451776-451787 121->127 128 451788-4517f4 call 43dddc call 45e74c * 6 121->128 143 4517f6-4517ff 128->143 144 45186c-451883 call 43dddc 128->144 145 451805-451829 call 441398 143->145 146 451889-45188c 143->146 144->143 144->146 156 451a2d-451a85 call 45e88c * 6 145->156 150 451e44-451e6f call 43dddc call 461130 146->150 151 451892-451899 146->151 154 45189d-4518b1 call 44efa8 150->154 168 451e75-451e7a 150->168 151->154 161 4518b7-4518bf 154->161 162 451f7a-451f86 call 44f00c 154->162 166 4518e4-4518f1 161->166 176 451f8b-451f9d call 4d6778 162->176 170 4518f7-4519a2 call 45e81c call 45e768 call 45e81c call 45e768 call 46def0 * 2 strcmp call 45e81c strcmp 166->170 171 4519c6-4519df call 45e81c strcmp 166->171 168->156 259 4518c4-4518c6 170->259 260 4519a8-4519aa 170->260 182 4519e5 171->182 183 4518d9-4518de 171->183 191 451ff0-452043 call 465f64 call 440168 call 43dddc 176->191 192 451f9f-451fa3 176->192 188 4519e8-451a12 call 44f00c call 444250 182->188 183->166 185 451a88-451a9a call 44f00c 183->185 205 451aa0-451aa7 185->205 206 45217a 185->206 218 451a14 188->218 219 451a27-451a29 188->219 240 452149-45214d 191->240 241 452049-45204b 191->241 199 451acd-451cab call 46e2fc call 45e81c call 45e768 * 8 call 44efa8 call 466e10 call 44f00c 192->199 199->156 325 451cb1-451cb9 199->325 212 451ea0-451ecb call 4417b8 205->212 213 451aad-451aaf 205->213 237 451ed5-451ed9 212->237 213->176 221 451ab5-451ac9 call 45e768 213->221 225 451d88-451d96 call 4611fc 218->225 227 451a1c-451a21 219->227 228 451a2b 219->228 221->199 225->237 244 451d9c-451da1 225->244 227->219 227->225 228->156 249 451edf 237->249 245 452051-45205f 240->245 247 452153-452157 240->247 241->245 246 45210f-452116 241->246 251 451da7-451db4 244->251 252 451f42-451f75 call 4417b8 244->252 253 452087-4520a3 call 46d958 245->253 254 452170-452178 call 43dbac 246->254 255 452118-45213f call 4417b8 246->255 247->245 256 45215d-452167 247->256 268 451ee6-451f35 call 4417b8 call 44f00c 249->268 276 451e80-451e9b call 4426f4 251->276 277 451dba-451dd4 call 44efa8 call 4611fc 251->277 252->156 278 4520a5-4520ae 253->278 279 4520cd-4520db 253->279 254->255 255->240 256->254 259->188 266 4518cc-4518d3 259->266 260->183 269 4519b0-4519b7 260->269 266->183 266->268 268->156 269->183 275 4519bd-4519c1 269->275 275->183 276->156 304 451f3a 277->304 305 451dda-451e3e call 44f00c call 444250 call 44e344 call 44416c 277->305 280 452061-452070 278->280 281 4520b0-4520cb _isctype 278->281 279->246 282 4520dd-4520fc call 45e768 279->282 287 452075-452077 280->287 281->287 282->199 299 452102-45210a call 43dbac 282->299 295 452080-452085 287->295 296 452079-45207e 287->296 295->253 295->279 296->279 296->295 299->199 304->252 305->156 326 451cbf-451d83 call 44e344 * 2 strcpy call 44e344 strcpy call 44efa8 call 44f00c 325->326 327 451fa8-451fd8 call 4417b8 325->327 326->225 327->168 333 451fde-451feb 327->333 333->156
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: " is already loaded for package "$" isn't loaded statically$_$_Init$_SafeInit$_SafeInit procedure$_SafeUnload$_Unload$can't use package in a safe interpreter: no $couldn't figure out package name for $couldn't find procedure $file "$fileName ?packageName? ?interp?$must specify either file name or package name$package "$tclLoad
                                  • API String ID: 0-3779648936
                                  • Opcode ID: 75fba5a1b0a4ca5265a2c16c6ccf39b476feb88a84be2af7966df52275708e34
                                  • Instruction ID: c00a1af82240b82faa0e8557ef3a81b664f4ccffdf4036484b8b1c7fcd63ba59
                                  • Opcode Fuzzy Hash: 75fba5a1b0a4ca5265a2c16c6ccf39b476feb88a84be2af7966df52275708e34
                                  • Instruction Fuzzy Hash: 755200B46097409FD324EF26C18165EBBE0BF89305F51892EE8D88B352D778D889DF46

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$AttributesSecurity
                                  • String ID:
                                  • API String ID: 3781014438-0
                                  • Opcode ID: 4e649b787673014de2c8a3fd55eb41e35a7923ea4e092edb758a103e2e76f4d9
                                  • Instruction ID: a3abeda2312fc98f1ecb3556fe63d974b0fa67047bf8c7f240cdef8d957601a1
                                  • Opcode Fuzzy Hash: 4e649b787673014de2c8a3fd55eb41e35a7923ea4e092edb758a103e2e76f4d9
                                  • Instruction Fuzzy Hash: 0E9100B05083418AD710AF69C59972EBBE4BF80354F408A2EF4D48B3A1EB79D848CB47

                                  Control-flow Graph

                                  APIs
                                  • SystemParametersInfoA.USER32 ref: 003DC8CA
                                  • SystemParametersInfoA.USER32 ref: 003DC901
                                  • GetDC.USER32 ref: 003DC928
                                  • GetDeviceCaps.GDI32 ref: 003DC93B
                                  • MulDiv.KERNEL32 ref: 003DC95B
                                  • MulDiv.KERNEL32 ref: 003DC979
                                  • GetStockObject.GDI32 ref: 003DC9B9
                                  • ReleaseDC.USER32 ref: 003DC992
                                    • Part of subcall function 003DBF60: CreateFontIndirectA.GDI32 ref: 003DBF76
                                    • Part of subcall function 003DBF60: DeleteObject.GDI32 ref: 003DBF95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: InfoObjectParametersSystem$CapsCreateDeleteDeviceFontIndirectReleaseStock
                                  • String ID: H$H$L$TkCaptionFont$TkDefaultFont$TkFixedFont$TkHeadingFont$TkIconFont$TkMenuFont$TkSmallCaptionFont$TkTextFont$TkTooltipFont
                                  • API String ID: 3648341535-1225234260
                                  • Opcode ID: 637375c4053f885c635a56b8329eecdfc40b692ef1a1679955e1f63ea1c0cbb8
                                  • Instruction ID: 279e3f8d36485a8c1512fc9a310478814cd1b18fbbd21824a3be11e23e9a6e14
                                  • Opcode Fuzzy Hash: 637375c4053f885c635a56b8329eecdfc40b692ef1a1679955e1f63ea1c0cbb8
                                  • Instruction Fuzzy Hash: 665129B16183098FD350EF28D58576AFBE5FB89304F52883EA98DC7345EB748848DB52

                                  Control-flow Graph

                                  APIs
                                  • GetEnvironmentVariableW.KERNEL32 ref: 004D67A8
                                  • GetTempFileNameW.KERNELBASE ref: 004D6842
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: EnvironmentFileNameTempVariable
                                  • String ID: %08x$10BITROCK_TEMP_FOLDER$::bitrock_dll_dir$::bitrock_tcl_is_using_only_s32_dll_path$AddDllDirectory$BRLXXXXXXXX$couldn't create temporary directory: %s$kernel32.dll
                                  • API String ID: 519535607-2396876941
                                  • Opcode ID: 85f529486d630a8076a812b9f16d0f7c71d7ef22385814c0ab0f19b0b58f4392
                                  • Instruction ID: 6e645b748847d707dfa13f813beba9ce8a6d283e39e0b77bad70ad3e8ade7388
                                  • Opcode Fuzzy Hash: 85f529486d630a8076a812b9f16d0f7c71d7ef22385814c0ab0f19b0b58f4392
                                  • Instruction Fuzzy Hash: DF6128B05093458BD710BF69E49926EBBE0BB84318F528C2EE8C89B341E778D449DB57
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Window$ClientMessageMoveRectSendVisible
                                  • String ID: *$,$@uT$WM_PROTOCOLS$WM_SAVE_YOURSELF$Z
                                  • API String ID: 3303122596-1213961097
                                  • Opcode ID: 49933bf59568ea4d00101c0eb245f3b82c7dfcaf28076d2ad1f89e846fd4d259
                                  • Instruction ID: a2dd19e124dc2529c33adbf4ea3bdc3f072dee979d4309879e239aa45b50371f
                                  • Opcode Fuzzy Hash: 49933bf59568ea4d00101c0eb245f3b82c7dfcaf28076d2ad1f89e846fd4d259
                                  • Instruction Fuzzy Hash: 4A4216745087418FD776EF28C58476ABBF0BF98310F11892EE88D8B655E778E885CB42

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 677 46b62c-46b63e 678 46b644-46b64c 677->678 679 46b7fc-46b809 call 44ee40 677->679 681 46b64e-46b678 _ftime 678->681 682 46b688-46b693 678->682 686 46b80b-46b810 call 44ee90 679->686 687 46b818-46b82c QueryPerformanceFrequency 679->687 683 46b67b-46b685 681->683 682->681 685 46b695-46b71b EnterCriticalSection QueryPerformanceCounter call 539ac4 682->685 694 46b721 685->694 695 46b88a-46b897 LeaveCriticalSection 685->695 686->687 691 46b874-46b87e 687->691 692 46b82e-46b835 687->692 691->686 696 46b837-46b85a GetSystemInfo call 49f274 692->696 697 46b89c 692->697 700 46b727-46b7f5 call 539ac4 * 3 call 539c20 LeaveCriticalSection 694->700 701 46b880-46b884 694->701 695->681 708 46b85c-46b864 696->708 709 46b86a 696->709 698 46b89e-46b8a8 697->698 699 46b8aa-46b993 InitializeCriticalSection CreateEventA * 2 CreateThread SetThreadPriority WaitForSingleObject CloseHandle call 46ae74 697->699 698->696 698->699 706 46b998 699->706 700->683 701->695 701->700 706->691 708->709 711 46b99d-46b9a5 708->711 709->691 711->709 712 46b9ab-46b9b3 711->712 712->709 714 46b9b9-46b9cb call 49f274 712->714 714->709 720 46b9d1-46b9e3 714->720 722 46b9e5-46b9ea 720->722 723 46b9fb-46ba04 720->723 722->709 724 46b9f0-46b9f5 722->724 723->709 725 46ba0a-46ba14 723->725 724->709 724->723 725->699
                                  APIs
                                  • _ftime.MSVCRT ref: 0046B655
                                  • EnterCriticalSection.KERNEL32 ref: 0046B6B0
                                  • QueryPerformanceCounter.KERNEL32 ref: 0046B6BD
                                  • LeaveCriticalSection.KERNEL32(?), ref: 0046B7EF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CriticalSection$CounterEnterLeavePerformanceQuery_ftime
                                  • String ID: Genu$ineI$ntel
                                  • API String ID: 809612594-3389352399
                                  • Opcode ID: 9f5c8e4b209ac8da6c8deea411d8f319b1df59173ab16a14b6e377bf6c60ce81
                                  • Instruction ID: a35327d348b56008006b46a807a402379e7a673d3fe5c74b124b54a26777b0e6
                                  • Opcode Fuzzy Hash: 9f5c8e4b209ac8da6c8deea411d8f319b1df59173ab16a14b6e377bf6c60ce81
                                  • Instruction Fuzzy Hash: 1CA1E6B05083468FD714EF29D58571BBBE4FB94305F14892EE4C88B261EB789889DF87

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Create$BitmapBrushPattern
                                  • String ID: 8.5$Button.border$Combobox.focus$Scrollbar.trough$alt$border$client$field$focus$slider$thumb$ttk::theme::winnative$winnative
                                  • API String ID: 3280665104-2073417573
                                  • Opcode ID: 84400eb966e7ef56234be4bec27faca8747a7c5ca670254faa650421662258bb
                                  • Instruction ID: 24107accb5b8ffc7108833ec47ab08f6b9e118ed55373f4f9442ed5c7c45861c
                                  • Opcode Fuzzy Hash: 84400eb966e7ef56234be4bec27faca8747a7c5ca670254faa650421662258bb
                                  • Instruction Fuzzy Hash: FD519AB0409711AFD701AF25E98926EBFE0BF85708F51CC1DE1984B211D7B98589AF87

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 839 3e3ab0-3e3acd 840 3e3ece-3e3ed8 839->840 841 3e3ad3-3e3afd GetMenuItemCount 839->841 842 3e3aff-3e3b03 841->842 843 3e3b20-3e3b30 841->843 846 3e3b04-3e3b1e RemoveMenu 842->846 844 3e3eac-3e3eb7 843->844 845 3e3b36-3e3b46 843->845 847 3e3ebd-3e3ec4 844->847 848 3e40c4-3e40d3 844->848 849 3e3c89-3e3cb7 845->849 846->843 846->846 847->840 848->847 850 3e40d9-3e40e3 call 37e304 848->850 854 3e3b4c-3e3b4f 849->854 855 3e3cbd-3e3cc0 849->855 850->847 856 3e40e9-3e40f2 DrawMenuBar 850->856 857 3e3c77-3e3c83 854->857 858 3e3b55-3e3b5a 854->858 855->858 859 3e3cc6-3e3cf0 855->859 856->847 857->844 857->849 860 3e3d60-3e3d65 858->860 861 3e3b60-3e3b89 858->861 866 3e3b8f-3e3b96 859->866 867 3e3cf6 859->867 862 3e3d67-3e3d84 860->862 863 3e3da4-3e3da9 860->863 861->866 871 3e3cf8-3e3d26 861->871 877 3e3d8c-3e3d93 862->877 868 3e3daf-3e3db4 863->868 869 3e40a8-3e40b9 863->869 866->871 872 3e3b9c-3e3bab 866->872 867->871 868->869 873 3e3dba-3e3dcf 868->873 869->848 874 3e3d2c-3e3d34 871->874 875 3e3bb1-3e3bb6 871->875 872->874 872->875 886 3e40f8 873->886 887 3e3dd5-3e3e00 873->887 880 3e3bbc-3e3bbf 874->880 882 3e3d3a 874->882 879 3e3d3c-3e3d43 875->879 875->880 883 3e3edc-3e3f8e call 397d68 877->883 884 3e3d99-3e3d9d 877->884 885 3e3bc5-3e3bc8 879->885 888 3e3d49-3e3d4f 879->888 880->879 880->885 882->879 911 3e3fb7-3e3fbd 883->911 942 3e3f90-3e3f94 883->942 889 3e3c56-3e3c6a 884->889 890 3e3bce-3e3bd3 885->890 891 3e3d55-3e3d5b 885->891 892 3e4102-3e4120 call 37e304 886->892 908 3e3fc8-3e3fcd 887->908 909 3e3e06-3e3e0a 887->909 888->890 888->891 889->857 904 3e3c6c-3e3c6f 889->904 894 3e3bd8-3e3be0 890->894 895 3e3bd5 890->895 910 3e4126-3e4176 DestroyMenu GetSystemMenu 892->910 892->911 899 3e3c24-3e3c2a 894->899 900 3e3be2-3e3bea 894->900 895->894 899->889 902 3e3c2c-3e3c53 899->902 900->899 905 3e3bec-3e3bf0 900->905 902->889 904->857 905->899 907 3e3bf2-3e3bfa 905->907 912 3e3bfc-3e3bff 907->912 913 3e3c06-3e3c11 907->913 915 3e4064-3e40a1 strcpy 908->915 916 3e3fd3-3e3ffc 908->916 914 3e3e4d-3e3e50 909->914 910->911 917 3e417c-3e41a5 910->917 921 3e3fc4 911->921 912->913 920 3e3c01-3e3c04 912->920 913->877 922 3e3c17-3e3c1e 913->922 923 3e3e0c-3e3e10 914->923 924 3e3e52-3e3e7b 914->924 915->869 932 3e3ffe 916->932 933 3e4037-3e4039 916->933 917->911 920->913 921->908 922->884 922->899 926 3e3e12-3e3e45 923->926 927 3e3e80-3e3ea5 923->927 924->926 939 3e3e7d 924->939 926->921 948 3e3e4b 926->948 927->926 932->915 935 3e403b-3e4060 933->935 936 3e4000-3e4033 933->936 935->936 936->915 950 3e4035 936->950 939->927 942->911 946 3e3f96-3e3fa9 942->946 946->911 947 3e3fab-3e3fb1 946->947 947->892 947->911 948->914 950->933
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Menu$CountItemRemove
                                  • String ID: (Pixmap)$(Tear-off)$.system$@uT$ge)
                                  • API String ID: 1046485675-2031372903
                                  • Opcode ID: 218670b735af8cd9044ca3353f580b53ccbb627ea6f6fc4dbb85a79c00371acd
                                  • Instruction ID: 12a0895ac2a350ab76b90a00b9b05299de653bcfe63df8d652e3a0c52494eca0
                                  • Opcode Fuzzy Hash: 218670b735af8cd9044ca3353f580b53ccbb627ea6f6fc4dbb85a79c00371acd
                                  • Instruction Fuzzy Hash: 67123971608391CFD325DF29D48865ABBF1BF88300F168A6DE8998B3A5D730D945CF82

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Window$Load$Icon$ClassCreateCursorLongRegisterShowUpdate
                                  • String ID: 0$TtkMonitorClass$TtkMonitorWindow
                                  • API String ID: 1906826020-4109889077
                                  • Opcode ID: 26b7acf006f8f15d332d04303b66380b5cd6a66955bcc529e03122785b80b0d3
                                  • Instruction ID: 9c36ece477c016ca052820f5a7f96af323095db1604eb50cd7b536d7ee5394fd
                                  • Opcode Fuzzy Hash: 26b7acf006f8f15d332d04303b66380b5cd6a66955bcc529e03122785b80b0d3
                                  • Instruction Fuzzy Hash: 5041DEB18083419ED360AF25C58939FBFE4BB84304F41892EE5C89B342DBB99549DB93

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1136 46fbc8-46fbe2 call 4678e0 1139 46fd04 1136->1139 1140 46fbe8-46fbf5 1136->1140 1143 46fd06-46fd0d 1139->1143 1141 46fd5c-46fd61 1140->1141 1142 46fbfb-46fbfe 1140->1142 1146 46fd6c 1141->1146 1144 46fc04-46fc06 1142->1144 1145 46fd10-46fd15 1142->1145 1147 46fd44-46fd52 call 468df4 1144->1147 1148 46fc0c-46fc27 1144->1148 1149 46fd20-46fd25 1145->1149 1156 46fd78 1146->1156 1147->1141 1151 46fe70 1148->1151 1152 46fc2d 1148->1152 1149->1146 1154 46fd27-46fd2c 1149->1154 1161 46fe7c-46fe85 GetLastError 1151->1161 1152->1149 1153 46fc33-46fc38 1152->1153 1157 46fe64-46fe69 1153->1157 1158 46fc3e-46fc43 1153->1158 1159 46fd2e-46fd33 1154->1159 1160 46fd39-46fd3e 1154->1160 1162 46fe00-46fe2b call 46f7b8 1156->1162 1163 46fd80-46fd93 call 4dfbf0 1156->1163 1164 46fe2c-46fe47 call 4dd82c 1156->1164 1165 46fdb8-46fdbe 1156->1165 1166 46fc4e-46fc5f 1157->1166 1158->1146 1167 46fc49 1158->1167 1159->1160 1159->1167 1160->1166 1168 46ff20-46ff2d 1161->1168 1169 46fe8b-46fe9c call 4dcb64 1161->1169 1184 46ff34-46ff4a GetLastError call 4dcb64 1163->1184 1185 46fd99-46fdb4 call 4dfc5c 1163->1185 1170 46fdc4-46fdc9 1165->1170 1171 46ff00-46ff08 call 476448 1165->1171 1175 46fc65-46fc79 1166->1175 1176 46fe48-46fe57 GetFileAttributesW 1166->1176 1167->1166 1168->1169 1169->1139 1196 46fea2-46febf call 465e10 1169->1196 1178 46ff10-46ff18 call 476448 1170->1178 1179 46fdcf-46fdfc call 476dcc 1170->1179 1171->1178 1187 46fc7c-46fcb3 CreateFileW 1175->1187 1176->1187 1190 46fe5d-46fe5f 1176->1190 1178->1168 1184->1139 1203 46ff50-46ff6d call 465e10 1184->1203 1187->1161 1194 46fcb9 call 46f5c0 1187->1194 1190->1187 1202 46fcbe-46fcc1 1194->1202 1207 46fec5-46fefd call 4417b8 1196->1207 1208 46ffb8-46ffc0 call 43dddc 1196->1208 1202->1156 1205 46fcc7-46fcd3 1202->1205 1217 46ffc5-46ffcd call 43dddc 1203->1217 1218 46ff6f-46ffa0 call 4417b8 1203->1218 1210 46ffa8-46ffb0 call 43dddc 1205->1210 1211 46fcd9-46fcff call 4417b8 1205->1211 1208->1207 1210->1208 1211->1139 1217->1218 1218->1143
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID: ": $": bad file type$TclpOpenFileChannel: invalid mode value$couldn't open "$couldn't reopen serial "
                                  • API String ID: 823142352-2463953032
                                  • Opcode ID: c8dac724ea1fa18222da841134a3e598cade25d16b399747c279857298cfbd56
                                  • Instruction ID: be32f8ff9fffabf87768351fc3d8a174164715eb2eebf39c54b9903618ff8b81
                                  • Opcode Fuzzy Hash: c8dac724ea1fa18222da841134a3e598cade25d16b399747c279857298cfbd56
                                  • Instruction Fuzzy Hash: 5B913AB15087018BD720AF69E48536EBBE0BB84314F14893FE9D9C7351E739D8898B4B

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 0044EFA8: EnterCriticalSection.KERNEL32(?,?,00000000,?,0046CEA7,?,?,?,?,00000000,?,0046D2F4), ref: 0044EFBA
                                    • Part of subcall function 00459288: __p__environ.MSVCRT ref: 004592D0
                                    • Part of subcall function 00459288: strchr.MSVCRT ref: 0045930D
                                    • Part of subcall function 00459288: __p__environ.MSVCRT ref: 00459358
                                  • __p__environ.MSVCRT ref: 004AEF74
                                  • strcmp.MSVCRT ref: 004AEFB7
                                  • __p__environ.MSVCRT ref: 004AEFCC
                                  • strcpy.MSVCRT ref: 004AF00E
                                  • strcpy.MSVCRT ref: 004AF02D
                                  • strcpy.MSVCRT ref: 004AF07A
                                  • _putenv.MSVCRT ref: 004AF08A
                                  • __p__environ.MSVCRT ref: 004AF0A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: __p__environ$strcpy$CriticalEnterSection_putenvstrchrstrcmp
                                  • String ID: HOME
                                  • API String ID: 3197676875-1195630948
                                  • Opcode ID: 9952ae3cab6fded1455cdcc5721c871138bf4e7afe5f2a2665155dc50625e64c
                                  • Instruction ID: 6b4849d1471fddfaec360bed1aeeaa9588b88475e930e3b9379e66c4a067e452
                                  • Opcode Fuzzy Hash: 9952ae3cab6fded1455cdcc5721c871138bf4e7afe5f2a2665155dc50625e64c
                                  • Instruction Fuzzy Hash: 135118715083018FD710EF69C48565EBBE0FFC9364F518A2EF4D897392D638984A8B57

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1265 46cad0-46caff call 469168 1268 46cb14-46cb16 1265->1268 1269 46cb01-46cb11 1265->1269 1270 46cc94 1268->1270 1271 46cb1c-46cb2b 1268->1271 1272 46cb35-46cb4f 1271->1272 1273 46cb2d-46cb2f 1271->1273 1277 46cb53-46cbad PeekMessageA 1272->1277 1273->1272 1275 46cc2c-46cc30 1273->1275 1275->1277 1278 46cbe5-46cc12 PeekMessageA 1277->1278 1279 46cbaf-46cbb2 1277->1279 1281 46cc14 1278->1281 1282 46cc50-46cc75 GetMessageA 1278->1282 1280 46cbb4-46cbe0 MsgWaitForMultipleObjectsEx 1279->1280 1280->1280 1285 46cbe2-46cbe3 1280->1285 1286 46cc16-46cc2b ResetEvent 1281->1286 1283 46cc77-46cc78 1282->1283 1284 46cc38-46cc45 PostQuitMessage 1282->1284 1287 46cc7a-46cc91 TranslateMessage DispatchMessageA 1283->1287 1288 46cc48-46cc4d 1283->1288 1284->1288 1285->1278 1285->1288 1287->1286 1288->1286
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessagePeek$EventMultipleObjectsResetWait
                                  • String ID: 0
                                  • API String ID: 2091726164-4108050209
                                  • Opcode ID: bb7804dc98d6886266191d639c69182ad4fa4a558152c182425db86c8532c7e1
                                  • Instruction ID: 957f5ae776555ca80a333d1427a8215866d8f2a71c639d05cfa3f14bc3c78c5a
                                  • Opcode Fuzzy Hash: bb7804dc98d6886266191d639c69182ad4fa4a558152c182425db86c8532c7e1
                                  • Instruction Fuzzy Hash: 3A4148B15083019FD310EF28D58976BBBE4FB88344F00892EE9D987341E779D9488B97
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Handle$CloseFilestrchr$CreateInformation
                                  • String ID: \
                                  • API String ID: 1583072716-2967466578
                                  • Opcode ID: c7855a12432fe2a8764a47010fadd3af24832d6ac5b8e7244ee9ebf5161e0913
                                  • Instruction ID: b701bf22191829b253e17641385aa8d9d50251d169ae95449245a3325f3590a0
                                  • Opcode Fuzzy Hash: c7855a12432fe2a8764a47010fadd3af24832d6ac5b8e7244ee9ebf5161e0913
                                  • Instruction Fuzzy Hash: 0AE1E0B45087419FC710EF28C59875ABBE1BF88358F15892EE8988B351E7789849CF86
                                  APIs
                                  Strings
                                  • ": , xrefs: 004D65B4
                                  • this library or a dependent library could not be found in library path, xrefs: 004D666C
                                  • this library or a dependent library is damaged, xrefs: 004D6695
                                  • couldn't load library ", xrefs: 004D65C0
                                  • A function specified in the import table could not be resolved by the system. Windows is not telling which one, I'm sorry., xrefs: 004D66BE
                                  • the library initialization routine failed, xrefs: 004D6633
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ErrorLastLibraryLoad
                                  • String ID: ": $A function specified in the import table could not be resolved by the system. Windows is not telling which one, I'm sorry.$couldn't load library "$the library initialization routine failed$this library or a dependent library could not be found in library path$this library or a dependent library is damaged
                                  • API String ID: 3568775529-695206046
                                  • Opcode ID: 3e45f9769a6de6a0a584adce0a2043c1619cc0ac3236ebd5644610d38d60c29b
                                  • Instruction ID: 80990012ddda75ba3a5f061f891bf4a3074d922ef162aafe62fae57234634db2
                                  • Opcode Fuzzy Hash: 3e45f9769a6de6a0a584adce0a2043c1619cc0ac3236ebd5644610d38d60c29b
                                  • Instruction Fuzzy Hash: 7A5129B49087009BD724AF28D59579EBBE1BF84308F11C92EE4C84B394D778C885DB9B
                                  APIs
                                  Strings
                                  • EmbeddedMenuWindowClass, xrefs: 003E75CC
                                  • EmbeddedMenuWindow, xrefs: 003E75C4
                                  • MenuWindowClass, xrefs: 003E7559
                                  • MenuWindow, xrefs: 003E7551
                                  • Failed to create the embedded menu window., xrefs: 003E7638
                                  • Failed to create the menu window., xrefs: 003E764C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: EmbeddedMenuWindow$EmbeddedMenuWindowClass$Failed to create the embedded menu window.$Failed to create the menu window.$MenuWindow$MenuWindowClass
                                  • API String ID: 716092398-4144410073
                                  • Opcode ID: 039f2170f133f9ddc1faec6f1dc80c70f263d448457ee5211b32082d3fa60d9a
                                  • Instruction ID: df84e9b675aa59eca6b1190a0a79aa4162c9fc4b2d52df23049832291ebd2d07
                                  • Opcode Fuzzy Hash: 039f2170f133f9ddc1faec6f1dc80c70f263d448457ee5211b32082d3fa60d9a
                                  • Instruction Fuzzy Hash: 1B319CB0109341CFE300AF25D49871ABFF4FB85309F51895DE8D89B2A1D7B98949DF86
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _stricmp$EnumFamiliesFont
                                  • String ID: Courier$Helvetica$Times
                                  • API String ID: 755624294-1931547285
                                  • Opcode ID: 760e8b7e281774c8dc3ff60955260ea26febcedcd298e5d67747880eed7f2ab0
                                  • Instruction ID: 54d6500df97b8d9d35d03bb44c2bad0ca8828fd3843c1c9d4d1a9c1d9b3fbca9
                                  • Opcode Fuzzy Hash: 760e8b7e281774c8dc3ff60955260ea26febcedcd298e5d67747880eed7f2ab0
                                  • Instruction Fuzzy Hash: 0E11F9B5108301DFD751AF39E98922AFBE4BF84354F16892EA49887352E7749844AB42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Handle$Close$ErrorLast_errno
                                  • String ID:
                                  • API String ID: 1802201974-0
                                  • Opcode ID: 6895db93166a4bd6a3aa4e84113b2fe151411372140bb898d305edd3cf681368
                                  • Instruction ID: 169bc72fbe41e62a91603cf73742c21318a684921661a7cb4334becdc8a39cb7
                                  • Opcode Fuzzy Hash: 6895db93166a4bd6a3aa4e84113b2fe151411372140bb898d305edd3cf681368
                                  • Instruction Fuzzy Hash: DA2193B0104302ABC714BF75A48552F7BA5BF81314F25496EE8D24B247E738DC858B5B
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: File$AttributesCloseCreateHandleTime
                                  • String ID:
                                  • API String ID: 1550419386-0
                                  • Opcode ID: 710d144106b66eab46acfae21a74a68ec91aaa7db769b777748fc366e0815953
                                  • Instruction ID: 50ed93039259737b6a04fd76c07ac749bd60b050348e31f1ff1582a47c74e2fc
                                  • Opcode Fuzzy Hash: 710d144106b66eab46acfae21a74a68ec91aaa7db769b777748fc366e0815953
                                  • Instruction Fuzzy Hash: E63118B18087009FC340EF28D58571ABBE1BB88324F558A2EF4D9CB391D738D9458B86
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Window$ColorLongProc
                                  • String ID: =jW$xpnative
                                  • API String ID: 3223664542-627742653
                                  • Opcode ID: 5a0fd4cc67fc0e41382c45abad4450804865f8c15a659c17cc153ad9a6f70ee1
                                  • Instruction ID: e006d155ac6632d87606b1769b1352428ec882da1869bca4f094f81738b62425
                                  • Opcode Fuzzy Hash: 5a0fd4cc67fc0e41382c45abad4450804865f8c15a659c17cc153ad9a6f70ee1
                                  • Instruction Fuzzy Hash: CF215CB26187018BC714EF39C98452ABBE4EFD9740F05882EE9C997352E2389944DB57
                                  APIs
                                  • GetFileType.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000004,line,0046F8EE), ref: 0046F5CA
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000004,line,0046F8EE), ref: 0046F5E4
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000004,line,0046F8EE), ref: 0046F5F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorFileLastModeType
                                  • String ID: line
                                  • API String ID: 2867079444-3507795190
                                  • Opcode ID: ce8c72247a5723c593b1d8c7bd8c58c9616b8d8506508f2682d3fe0864f7a98d
                                  • Instruction ID: e887a74253c7b6336cf134696a1ff3362dbbf791a423bb6903e171a8cb783d6e
                                  • Opcode Fuzzy Hash: ce8c72247a5723c593b1d8c7bd8c58c9616b8d8506508f2682d3fe0864f7a98d
                                  • Instruction Fuzzy Hash: CBF019A05093016ADB10BE38B98525BABD9AB84360F04093AECC6C2241F728CD49C6AB
                                  APIs
                                  • DeleteFileW.KERNELBASE(?,?,?,?,004651D7), ref: 004DB79C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: 1c3cb04aa950b2339ee88be5b897c13cfbb9fdb01e3d282ad5f45c3f3812beb8
                                  • Instruction ID: 2a41389517bc5afe223ae437ce5a8d133382f19c407f8e20b599bd996172072e
                                  • Opcode Fuzzy Hash: 1c3cb04aa950b2339ee88be5b897c13cfbb9fdb01e3d282ad5f45c3f3812beb8
                                  • Instruction Fuzzy Hash: 13316C70508601CBD7107F69D99A76E7AA4EF40314F46496FF8C58B3A1E738C881DB9B
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strchrstrcspn
                                  • String ID: ,[]$:
                                  • API String ID: 2389082320-2376022092
                                  • Opcode ID: 63efe262d260328c0d5c4a72c8537122669b3743a0e7302031c8197f66bda058
                                  • Instruction ID: 42e3b608252e984f672fbb76875206827cb8ff36a990a5e77fda06795419d317
                                  • Opcode Fuzzy Hash: 63efe262d260328c0d5c4a72c8537122669b3743a0e7302031c8197f66bda058
                                  • Instruction Fuzzy Hash: 59910778A042098FCF04EFA8C0999ADBFF1BF89350F048569E895AB361D734E944CF91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: freemallocmemsetrealloc
                                  • String ID:
                                  • API String ID: 3181159437-0
                                  • Opcode ID: 8d66b934244bebba5c69ec2791e80421896b0246c15418aa41eed42ef7b25311
                                  • Instruction ID: 9bfff403e3c15a5cf44f17c21e53f590fee013aaadf0939e56c75b1a1990cba0
                                  • Opcode Fuzzy Hash: 8d66b934244bebba5c69ec2791e80421896b0246c15418aa41eed42ef7b25311
                                  • Instruction Fuzzy Hash: 8F3186B4A0460A9FCB00DFA8C585AAEBBF1FF49344F148A29E855DB351D374E9418F91
                                  APIs
                                  • CreateCompatibleDC.GDI32 ref: 003D1D72
                                  • SelectObject.GDI32(?), ref: 003D1D84
                                  • GetBkMode.GDI32(?,?,?,?,00000000,00000000,?,003D2A80), ref: 003D1DA0
                                  • GetDC.USER32 ref: 003D1DDD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CompatibleCreateModeObjectSelect
                                  • String ID:
                                  • API String ID: 1794513709-0
                                  • Opcode ID: ef5172f729241b1a12aea80c7fc8973ac6023e2fcf61f5e4e6e930afbadcd12f
                                  • Instruction ID: f5645e0b9d9a823412b8a329e73fd0baba0f9646a2dc8da69778847a7c9155cf
                                  • Opcode Fuzzy Hash: ef5172f729241b1a12aea80c7fc8973ac6023e2fcf61f5e4e6e930afbadcd12f
                                  • Instruction Fuzzy Hash: C5112575604701AFC351EF69D880A6ABBF5FF89310F05892DE889C7712E730E840CB91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: File$ErrorLastPointerWrite_errno
                                  • String ID:
                                  • API String ID: 1419429845-0
                                  • Opcode ID: 8bbbaae0899c3dc8fd167de84f77d67c1791881651c8c2d9f21b92018bb95d93
                                  • Instruction ID: 050a46d9e6c6b5651aca798de6920ea1eb87b21b91d2975b5bf81e343401ad7b
                                  • Opcode Fuzzy Hash: 8bbbaae0899c3dc8fd167de84f77d67c1791881651c8c2d9f21b92018bb95d93
                                  • Instruction Fuzzy Hash: 6011C2B05083018FD700EF68D08971ABBE0BF85314F10896EE8D88B392E779D859CB53
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _errno$ErrorFileLastRead
                                  • String ID:
                                  • API String ID: 2044071692-0
                                  • Opcode ID: bb873248c5a863df13687d972434ac3173878c2615178f0c8e562e3a64c2a55a
                                  • Instruction ID: c3917b42634d7f57699719b3a2b194e160fa646d30c413fa6789f948ccd9ddbb
                                  • Opcode Fuzzy Hash: bb873248c5a863df13687d972434ac3173878c2615178f0c8e562e3a64c2a55a
                                  • Instruction Fuzzy Hash: 6801B2B59083018FCB00EF78C58561ABBF4BF89341F40496AF8948B351E739D954CB53
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: EnumFamiliesFont$Release
                                  • String ID:
                                  • API String ID: 2372228163-0
                                  • Opcode ID: 32ec19f463853de9f89c693667bc188274c23a7857823e18edf9584bcec4f750
                                  • Instruction ID: b81477276b051b76aec0be955d1fafa5b4593d529a0aa5a71ab3718838a9370a
                                  • Opcode Fuzzy Hash: 32ec19f463853de9f89c693667bc188274c23a7857823e18edf9584bcec4f750
                                  • Instruction Fuzzy Hash: 4FF049B25293118FC710BF38A68A51ABFE4BB85304F02495EF98887306D634D944CBA3
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Window$Create
                                  • String ID: TkChild
                                  • API String ID: 870168347-227893619
                                  • Opcode ID: 4649d0166db46e273271404fc9cffbe320e9402bc9a68333488031d95640dbee
                                  • Instruction ID: 7f06481f7353cc5593b93cd65b018e2a98f5e778ef9325b76de16808b7ce536c
                                  • Opcode Fuzzy Hash: 4649d0166db46e273271404fc9cffbe320e9402bc9a68333488031d95640dbee
                                  • Instruction Fuzzy Hash: 2211C3B19083018FE350DF29C19970BBFF4BB88754F15891EE8889B351D3BAC9498F92
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer_errno
                                  • String ID:
                                  • API String ID: 2889454840-0
                                  • Opcode ID: 5e246c1c20bcc9cbdd872ce8313f50ceaac767b4da7c3d71e5b09fe8c3f31ebd
                                  • Instruction ID: b689b586c7c75c90bf6df778f736b0142db8d99d3da019814cd6fa1ad8f854f9
                                  • Opcode Fuzzy Hash: 5e246c1c20bcc9cbdd872ce8313f50ceaac767b4da7c3d71e5b09fe8c3f31ebd
                                  • Instruction Fuzzy Hash: D40102746087029FC710EF69E48551BBBE0AF88360F108A6EF8E5C7390E634D8898B57
                                  APIs
                                  • SetErrorMode.KERNEL32(?,?,?,?,?,?,0046B12C,?,?,?,?,?,?,00445240), ref: 00458DF0
                                  • SetErrorMode.KERNEL32(?,?,?,?,?,?,?,0046B12C,?,?,?,?,?,?,00445240), ref: 00458DFC
                                  • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,0046B12C,?,?,?,?,?,?,00445240), ref: 00458E09
                                    • Part of subcall function 0049EB7C: GetVersionExA.KERNEL32 ref: 0049EB9D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ErrorMode$HandleModuleVersion
                                  • String ID:
                                  • API String ID: 1490064178-0
                                  • Opcode ID: ade49b47ba83f9e244243574f171b65c4845c13871431e0747fd5e45fe700eca
                                  • Instruction ID: 57b4791052d1935eb6af78ab50a4a3e8b5f65df2e712e760bbdf27a12a63de12
                                  • Opcode Fuzzy Hash: ade49b47ba83f9e244243574f171b65c4845c13871431e0747fd5e45fe700eca
                                  • Instruction Fuzzy Hash: F9D09EF041860156D7407F79C54A71ABEE4BF94305F411C5CF4C496252E67D50954B27
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ProcWindow
                                  • String ID:
                                  • API String ID: 181713994-0
                                  • Opcode ID: 6006dcc16cc14c2132f972353ad2f9e31400fc12e1f4a17b049cc78834cb386e
                                  • Instruction ID: 97eff6aed30fa4be07040702cc067022084a688f4aad1ec0c701d83561fe182c
                                  • Opcode Fuzzy Hash: 6006dcc16cc14c2132f972353ad2f9e31400fc12e1f4a17b049cc78834cb386e
                                  • Instruction Fuzzy Hash: 5C71E2B49087018FDB22DF29C08461ABBF4BF89354F518A2EF9999B751D335D981CF42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CaptureProcWindow
                                  • String ID:
                                  • API String ID: 49417107-0
                                  • Opcode ID: 4c0254630cf29fe0bb7c91a48a7a45131f940f986936bb80a47816d65bb43b27
                                  • Instruction ID: 0d36d12e791228afdfde098155f8e127c06ea60d71a924dd755cc8572bbdb647
                                  • Opcode Fuzzy Hash: 4c0254630cf29fe0bb7c91a48a7a45131f940f986936bb80a47816d65bb43b27
                                  • Instruction Fuzzy Hash: 08318770A083A58FD71ADF26C08665FBBF5FBA4384F10CA2EE48997291D371D9448B43
                                  APIs
                                  • GetFileAttributesW.KERNELBASE ref: 004D9E91
                                  • SetFileAttributesW.KERNELBASE ref: 004D9EDF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 255756ac0acc526ec1934aaacade901e34db8ad0c6560b78fef4f010887fb4c3
                                  • Instruction ID: dcc1b54789f6b6bd2a4e8022674403334af1d7b001692774610550dda650ca05
                                  • Opcode Fuzzy Hash: 255756ac0acc526ec1934aaacade901e34db8ad0c6560b78fef4f010887fb4c3
                                  • Instruction Fuzzy Hash: 1E113A716082018FC300EF2AE98591BBBF5EB89364F14492FF988C7350E635EC59DB52
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileLast
                                  • String ID:
                                  • API String ID: 1799206407-0
                                  • Opcode ID: de7ab3721b0c25fc2eca65ef43d0cedbbd12b28be7f8943831c91100600a1f60
                                  • Instruction ID: 014233d235e369d06c7315f128ae9e6dea5091541b3c323ae94909b2b6404e13
                                  • Opcode Fuzzy Hash: de7ab3721b0c25fc2eca65ef43d0cedbbd12b28be7f8943831c91100600a1f60
                                  • Instruction Fuzzy Hash: 0BF081B05056019FD740AFB9E98A12E7BE4BF44310F814E6FE4D4CA3A1EB3CC8599B52
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CreateDeleteFontIndirectObject
                                  • String ID:
                                  • API String ID: 1932138579-0
                                  • Opcode ID: 71b2dc7fc936ef8a979eab6df62f335bd0338c744ccc564880cec441c6f6b511
                                  • Instruction ID: 9795e567d0af9694d24fe4677d9584a5043be28be5d6ea0845f06eb8644b27d4
                                  • Opcode Fuzzy Hash: 71b2dc7fc936ef8a979eab6df62f335bd0338c744ccc564880cec441c6f6b511
                                  • Instruction Fuzzy Hash: 5AE0EDB16087119FC354EF2DA8C155BBBE4AF8C250F01492DF489C7311E230DD85CB92
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 0bd87463480d0a420ad1b2e099cb034f4e0b2a7b0528ba138b1154a28bc5cff1
                                  • Instruction ID: 986f8ae0d8b56c119b2fd8aa43ad4015cac8fa7e90984dd7336b0a64df44aa70
                                  • Opcode Fuzzy Hash: 0bd87463480d0a420ad1b2e099cb034f4e0b2a7b0528ba138b1154a28bc5cff1
                                  • Instruction Fuzzy Hash: 5AD062709046414BDB00BF7CD95632A7AE07B40701FC549ADD884CB351F67DD559CB57
                                  APIs
                                    • Part of subcall function 0044F38C: TlsGetValue.KERNEL32(?,?,?,?,?,0046D0C9), ref: 0044F3A2
                                  • malloc.MSVCRT ref: 0046D14F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Valuemalloc
                                  • String ID:
                                  • API String ID: 1411070159-0
                                  • Opcode ID: 585c71ef4b9fffb857153dc859fc8f13efb6283f3f24b8bf410c71a6c910569a
                                  • Instruction ID: fc12421f26db4e651d0082fdde22a55df4a3181eecc5f8e7e327aa9a263ba990
                                  • Opcode Fuzzy Hash: 585c71ef4b9fffb857153dc859fc8f13efb6283f3f24b8bf410c71a6c910569a
                                  • Instruction Fuzzy Hash: E871A470B043068FD708CF2DD48475ABBE1FB99318F14866ED8498B365E734E95ACB86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 8049e3bb231ae083cfde84d65640efb31e92699a7077fe0481eb3a1e4f679d34
                                  • Instruction ID: e8402ab1b2467c77fc1ee4d104eb6b95192b6676bd5a0857adf816c7a09ec3c1
                                  • Opcode Fuzzy Hash: 8049e3bb231ae083cfde84d65640efb31e92699a7077fe0481eb3a1e4f679d34
                                  • Instruction Fuzzy Hash: F231F731F086858BCB04DF29D58045E7BD2EEC5364B08862BE99D8B352EA35DC45C797
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ShowWindow
                                  • String ID:
                                  • API String ID: 1268545403-0
                                  • Opcode ID: 68cfebe879bfd5e4b94068c8a81ccec667741ec60153b312861f81d55d1b82f1
                                  • Instruction ID: d69c7be4489560fc7eda79005ffa500673ebaeef701ccd01ad1542efa041584a
                                  • Opcode Fuzzy Hash: 68cfebe879bfd5e4b94068c8a81ccec667741ec60153b312861f81d55d1b82f1
                                  • Instruction Fuzzy Hash: 81014FB194460187EB32DE2888C175E77D4AB85301F99C6B5EC4CCB785E62AC890A793
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: DeleteObject
                                  • String ID:
                                  • API String ID: 1531683806-0
                                  • Opcode ID: 82a8d1ed095d0219ad74f628f4fb5209fc22c16b0773b00a2daeb35f28f733a3
                                  • Instruction ID: 21a82aa140d962b3dbac38aa75816662c7009e548a148c64883540dfd6cc6024
                                  • Opcode Fuzzy Hash: 82a8d1ed095d0219ad74f628f4fb5209fc22c16b0773b00a2daeb35f28f733a3
                                  • Instruction Fuzzy Hash: 72F01D322041548BD721EF6DE8C595ABBE8FA44754B16012AEA5887312D320E854CB95
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ProcWindow
                                  • String ID:
                                  • API String ID: 181713994-0
                                  • Opcode ID: 25eb7d5989f8997a8024a76bc9ac2325b3bba4f029abd450f09c48a6b7404716
                                  • Instruction ID: 1323be59dd716cceb2cbeb47957d0b098b4fae01491d9bbeb818df72cd792d6c
                                  • Opcode Fuzzy Hash: 25eb7d5989f8997a8024a76bc9ac2325b3bba4f029abd450f09c48a6b7404716
                                  • Instruction Fuzzy Hash: 6AF04DB99083449FC301EF29C18195BBBF4BA89350F008D2EE9D983311E732DA588B43
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: memcmp
                                  • String ID:
                                  • API String ID: 1475443563-0
                                  • Opcode ID: a47a59589998537e118903d2f346e67bbc0c622a63863564ad643e811bcd6fe6
                                  • Instruction ID: fcb87e41a1d994746abb895cda0626ba4a5aed789424afb8e4372383c987ac70
                                  • Opcode Fuzzy Hash: a47a59589998537e118903d2f346e67bbc0c622a63863564ad643e811bcd6fe6
                                  • Instruction Fuzzy Hash: 2E6113706083418FDB14CF5AC480A1AFBF5BF85704F1889BEE9898B345D379E846CB96
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 13e53bbb7a0bea1d6fe571b89e205352fcf6399910395eb21412ee6f514cc803
                                  • Instruction ID: 1eddb3d81efedbaed458e985e2776d0ba04a0a90c21b91b0558d8991da1a44a9
                                  • Opcode Fuzzy Hash: 13e53bbb7a0bea1d6fe571b89e205352fcf6399910395eb21412ee6f514cc803
                                  • Instruction Fuzzy Hash: 8A410A7550830A8FC714DF29D48486ABBF4FF88308F454A6EE4D9D7261E734EA598F42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: b37f793ed9d111869176937ecfc66a2467eb0782a1a35bbde6123aedd1eeb38a
                                  • Instruction ID: 0a09cc0f878b8f523ccdf42316133ac1a63f1ba7547256caaf8355d4cea0af14
                                  • Opcode Fuzzy Hash: b37f793ed9d111869176937ecfc66a2467eb0782a1a35bbde6123aedd1eeb38a
                                  • Instruction Fuzzy Hash: 6541C374E012099FDF04DFA8C485A9DBBF5FF88314F10896AE964A7351E730AA45CF91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: c30b9148f90446b647813149dcb307bb475232d177b98a154f2b8e772c750aa8
                                  • Instruction ID: c22199ba86cb1a45dc561f137a5dfb67773712e4c5fdaa2f660c8d11a07530de
                                  • Opcode Fuzzy Hash: c30b9148f90446b647813149dcb307bb475232d177b98a154f2b8e772c750aa8
                                  • Instruction Fuzzy Hash: 4521B2B4A0474D9BDF04EFB4D4898DEBBF5BF88300F10882AE856A7341EA34D9459E61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: c894353a6d479ed7997cedfe34991e9f0b7e1c9b8f57e0a89f2baa2afbf518ab
                                  • Instruction ID: c83663a06b87cd707775d9991470cfc155fe22b4f98b6b84655a3bdf0dfa458d
                                  • Opcode Fuzzy Hash: c894353a6d479ed7997cedfe34991e9f0b7e1c9b8f57e0a89f2baa2afbf518ab
                                  • Instruction Fuzzy Hash: 0211B374E042099BCF04EFB9D1895DEFBF5BF88340F10896AE855A7301EB349A448F65
                                  APIs
                                  • malloc.MSVCRT ref: 0053E152
                                    • Part of subcall function 0053E34C: malloc.MSVCRT ref: 0053E35C
                                    • Part of subcall function 0053782C: abort.MSVCRT ref: 0053787C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: malloc$abort
                                  • String ID:
                                  • API String ID: 1052873801-0
                                  • Opcode ID: f7ad7c2ebaa3edf0a4ba63d0237c03d8553324c03d89d72e3250272c47d0bd95
                                  • Instruction ID: df977a9746d0ef40d4027fa7da5eb812f853ebe838dca341d14399a62324b019
                                  • Opcode Fuzzy Hash: f7ad7c2ebaa3edf0a4ba63d0237c03d8553324c03d89d72e3250272c47d0bd95
                                  • Instruction Fuzzy Hash: B1F0F8B0A083068ADB107F64D88A22EBFE8BF96305F085C1CE5C45B382DB719454DBA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $" must be -chars, -displaychars, -displayindices, $": must be <, <=, ==, >=, >, or !=$-chars$-displaychars$-displayindices$-displaylines$-displaylines, -indices, -lines, -update, $-indices$-lines$-update$-xpixels$-xpixels, or -ypixels$-ypixels$?options? index1 index2$bad comparison operator "$bad option "$boolean$index$index1 ?index2 ...?$index1 op index2$option$option ?arg arg ...?
                                  • API String ID: 0-129498027
                                  • Opcode ID: 92dce5c43d5d56b065c92e3b010b20df07ae6b341ea7db8cbc346678e7b88070
                                  • Instruction ID: 77c25cd430757a0fc68efc70285a87aeeac225ea7d49110548bfbbdc0cbd2323
                                  • Opcode Fuzzy Hash: 92dce5c43d5d56b065c92e3b010b20df07ae6b341ea7db8cbc346678e7b88070
                                  • Instruction Fuzzy Hash: 48A2F0B4508744CFD725DF29C585BAABBE1AB89300F15892DE989CB311DB34EC84DF42
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: " to "$" with directory "$" with file "$": $": "$": trying to rename a volume or move a directory into itself$-permissions$::tcl::CopyDirectory$can't overwrite directory "$can't overwrite file "$can't unlink "$copying$error $error renaming "$ming$renaming
                                  • API String ID: 0-36742658
                                  • Opcode ID: 87fd201fc97778b9cda1d87b8aaf5e1881a8c21da1bd981f91a68441dbcfebec
                                  • Instruction ID: 5d3cd9f91c88497313cfbcd1bb5e3d99451843f5d69c665b8e14fc696f2d0159
                                  • Opcode Fuzzy Hash: 87fd201fc97778b9cda1d87b8aaf5e1881a8c21da1bd981f91a68441dbcfebec
                                  • Instruction Fuzzy Hash: 5D2205B0509705DFD750EF29C18072AFBE0BF84744F55892EE9898B361E778D881CB9A
                                  Strings
                                  • !, xrefs: 004CE9FA
                                  • string format ?varName varName ...?, xrefs: 004CE38C
                                  • %, xrefs: 004CE0D8
                                  • different numbers of variable names and field specifiers, xrefs: 004CF1A6
                                  • %I64u, xrefs: 004CF47E
                                  • %lu, xrefs: 004CF402
                                  • , xrefs: 004CE746
                                  • "%n$" argument index out of range, xrefs: 004CE292
                                  • %, xrefs: 004CDE0F
                                  • bad scan conversion character ", xrefs: 004CDF01
                                  • variable is not assigned by any conversion specifiers, xrefs: 004CE7F6
                                  • couldn't set variable ", xrefs: 004CE1C1
                                  • variable is assigned by multiple "%n$" conversion specifiers, xrefs: 004CE6AA
                                  • cannot mix "%" and "%n$" conversion specifiers, xrefs: 004CED08
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $!$"%n$" argument index out of range$%$%$%I64u$%lu$bad scan conversion character "$cannot mix "%" and "%n$" conversion specifiers$couldn't set variable "$different numbers of variable names and field specifiers$string format ?varName varName ...?$variable is assigned by multiple "%n$" conversion specifiers$variable is not assigned by any conversion specifiers
                                  • API String ID: 0-3159065508
                                  • Opcode ID: 363d29f2eeac369fcfabbdec3d629d992361dd5ddcc0e617f9f5043331ea6c9d
                                  • Instruction ID: de9b860e2730fad2340f8cf86cbee61aaf724d50490658e3a79149f1b19ba673
                                  • Opcode Fuzzy Hash: 363d29f2eeac369fcfabbdec3d629d992361dd5ddcc0e617f9f5043331ea6c9d
                                  • Instruction Fuzzy Hash: 60B2E5B85083818FD764EF2AC084B6BBBE1BF85304F54892EE5C987351E7789845DB4B
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$Free$DirectoryLoadPrivateProfileStringWindowsstrchr
                                  • String ID: /users/default$@$NetApiBufferFree$NetGetDCName$NetUserGetInfo$Password Lists$netapi32.dll$system.ini
                                  • API String ID: 2150743890-3010365575
                                  • Opcode ID: 575bb498bffda5fb62824c0de23ee492f8aad45a2ad06ce5e7129f94be074ed6
                                  • Instruction ID: d4c191c149fc64cf1ac9b599b42af266667afde17ed5922c852e60c1c3b8f449
                                  • Opcode Fuzzy Hash: 575bb498bffda5fb62824c0de23ee492f8aad45a2ad06ce5e7129f94be074ed6
                                  • Instruction Fuzzy Hash: 1B711FB46087019BC310AF29C58422EFBF5BFC4314F11892EE8D89B351EB78E9458B97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: string but got "$" instead$H$bad field specifier "$binary$cannot use "*" in format string with "x"$expected $formatString ?arg arg ...?$hexadecimal$missing count for "@" field specifier$not enough arguments for all format specifiers$number of elements in list does not match count$option$option ?arg arg ...?$value formatString ?varName varName ...?
                                  • API String ID: 0-4127258308
                                  • Opcode ID: be70e19173d1ce1bba207ab537b2d358c7ddfec8a88a5c65a98f322e968d7a5f
                                  • Instruction ID: 67bbe6a68aa9acbfcda83b198d3d6df84f040e02fde4372ddd0043cfb9da2f22
                                  • Opcode Fuzzy Hash: be70e19173d1ce1bba207ab537b2d358c7ddfec8a88a5c65a98f322e968d7a5f
                                  • Instruction Fuzzy Hash: ABB257705487818FE724CF28C18466FBBE1BB85314F24892EE99587391D379EC86DB4B
                                  APIs
                                    • Part of subcall function 003D1D50: CreateCompatibleDC.GDI32 ref: 003D1D72
                                    • Part of subcall function 003D1D50: SelectObject.GDI32(?), ref: 003D1D84
                                    • Part of subcall function 003D1D50: GetBkMode.GDI32(?,?,?,?,00000000,00000000,?,003D2A80), ref: 003D1DA0
                                  • CreateCompatibleDC.GDI32 ref: 003E51C4
                                  • CreateCompatibleBitmap.GDI32 ref: 003E51EB
                                  • SelectObject.GDI32 ref: 003E51FE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CompatibleCreate$ObjectSelect$BitmapMode
                                  • String ID:
                                  • API String ID: 3545600193-3916222277
                                  • Opcode ID: 491d8fd40cb4a1171c15c59f8d2b9c4d35c8e00b6db7c2881ffce2720dba5090
                                  • Instruction ID: de2cc535009a5d924f8382a492938cd18bc6f03628d488b88a9ed633a771c4df
                                  • Opcode Fuzzy Hash: 491d8fd40cb4a1171c15c59f8d2b9c4d35c8e00b6db7c2881ffce2720dba5090
                                  • Instruction Fuzzy Hash: DAA2ADB4608785CFC765DF29C584A5ABBF1BF88304F158A2EE9998B351E770E844CF42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ErrorHandleInformationLastMessageSendbindclosesocketconnecthtonsinet_addrioctlsocketsocket
                                  • String ID: couldn't open socket:
                                  • API String ID: 409101297-4183823696
                                  • Opcode ID: 7ee4e4605b14ac6eea9edf6d30a3d38a8fa384cd744844089856c17810ea1280
                                  • Instruction ID: ca061c1e2ebd6c47296ad53ff5b9372f5142712cf8bdd343626b142572bcc940
                                  • Opcode Fuzzy Hash: 7ee4e4605b14ac6eea9edf6d30a3d38a8fa384cd744844089856c17810ea1280
                                  • Instruction Fuzzy Hash: 61514D745083058AC710BF75C58566EBBE4AF81358F12C92EF4D88B392EB78D944CB5B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3916222277
                                  • Opcode ID: b6bb395f8d158f9d4fe90be00f62bf563b0acae30bc8ef314e6956a22c942b84
                                  • Instruction ID: f5ba3acc8d25bb8a0bbceb09da22c43a2ee8a26fa936f8e04e98a358322dd2f6
                                  • Opcode Fuzzy Hash: b6bb395f8d158f9d4fe90be00f62bf563b0acae30bc8ef314e6956a22c942b84
                                  • Instruction Fuzzy Hash: 38E2BEB46087418FD754DF28C180B5ABBF1BF88700F14892EE9988B396DB78E945CF56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: command$handle$index$index ?x y?$index x y$invalid sash index$not managed by this window$option$option ?arg ...?$option ?arg arg...?$pane ?option? ?value option value ...?$pane option$sash$widget ?widget ...?$x y
                                  • API String ID: 0-1334850362
                                  • Opcode ID: d6ee044a783fe307e6dc6eb67c20256acbeca1ee88cf9ba62b8ed26617ae5951
                                  • Instruction ID: 7e6d8e4095a18189f677e5e2f23e5c64452bb28dd936131d07bdaa23b8ce2524
                                  • Opcode Fuzzy Hash: d6ee044a783fe307e6dc6eb67c20256acbeca1ee88cf9ba62b8ed26617ae5951
                                  • Instruction Fuzzy Hash: FAB20774618741DFC765DF29C184AAABBF0BF89308F11992DE6998BB21D770E844CF42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: BitmapCreate
                                  • String ID: ($@$Tk_GetPixmap: Error from CreateDIBSection
                                  • API String ID: 386609356-2367294682
                                  • Opcode ID: 319739bdbc8a934b97121eec29cf53ccccc750ce2a4148d2de58badca8fa22c9
                                  • Instruction ID: 6123ffc9e2f0ed26c58492f2ccc0328db594a6fd92e5353c0e859f767daa7d7a
                                  • Opcode Fuzzy Hash: 319739bdbc8a934b97121eec29cf53ccccc750ce2a4148d2de58badca8fa22c9
                                  • Instruction Fuzzy Hash: 4651D0B06083419FD350EF28C584B5ABBF4BF88344F51892DE8988B356E775E848DF92
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AdjustIconicRectWindowZoomed
                                  • String ID:
                                  • API String ID: 2101886608-0
                                  • Opcode ID: 422916759a59b85fc7d9fef160750db6898702da659a66ef3c5baa3965e42811
                                  • Instruction ID: 29ba01b8971c8a59acf1be68b372cb338ec18e8b2dbcc09bb4cc523032f439d7
                                  • Opcode Fuzzy Hash: 422916759a59b85fc7d9fef160750db6898702da659a66ef3c5baa3965e42811
                                  • Instruction Fuzzy Hash: 7FE15971508301CFC725DF29C188A6ABBF1BF88358F058A6DE89D9B745DB34E944CB46
                                  APIs
                                  Strings
                                  • TkChild, xrefs: 00394421
                                  • Unable to register TkChild class, xrefs: 003944E0
                                  • Unable to load common controls?!, xrefs: 003944F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ClassCommonControlsInfoInitKeyboardLayoutLocaleRegister
                                  • String ID: TkChild$Unable to load common controls?!$Unable to register TkChild class
                                  • API String ID: 1303443831-1470692908
                                  • Opcode ID: b3a5ed26d57e7fa6cd4ee599acd48dbfeb1f161e34bb2eb07d38fc83e1a83d67
                                  • Instruction ID: 4aada5df1065aaef3bcd3c43361aa4f4bf536dbb2cb551a0999975651e87ccd7
                                  • Opcode Fuzzy Hash: b3a5ed26d57e7fa6cd4ee599acd48dbfeb1f161e34bb2eb07d38fc83e1a83d67
                                  • Instruction Fuzzy Hash: 8E3108B88083428FE709EF65D58971FBBE4BF50305F41495CE5D88F261D7B88449EB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: getenvstrspn
                                  • String ID: +-:0123456789$@$d$unicode
                                  • API String ID: 910392788-1330096729
                                  • Opcode ID: 3c46c4f572cac8e5ef27823526acc6ad210bb7273b59ee4aa5ef6f98acea3b75
                                  • Instruction ID: 981aa36685c638f0c9ce1ea5ea5a1ead8ba0dfadbe6eb983cdea39363626087d
                                  • Opcode Fuzzy Hash: 3c46c4f572cac8e5ef27823526acc6ad210bb7273b59ee4aa5ef6f98acea3b75
                                  • Instruction Fuzzy Hash: 50416DB15083418BE310EF15C49436FBBE4BB85358F14891EE8D89B381E7BD8989CB97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ARITH$DIVZERO$DOMAIN$TclExecuteByteCode: unrecognized opCode %u$divide by zero$exponent too large$exponentiation of zero by negative power
                                  • API String ID: 0-2679069157
                                  • Opcode ID: 335270280cfc35ccee1a13722e156c9c21751b2df35819616b7853c586f0d724
                                  • Instruction ID: 75ec49f181363d484b4c8ec84bab575d68c6a2d9dba4def9b7649faaba956460
                                  • Opcode Fuzzy Hash: 335270280cfc35ccee1a13722e156c9c21751b2df35819616b7853c586f0d724
                                  • Instruction Fuzzy Hash: 0DC20970608741CFCB38DF29C1847AABBE1FB89304F55892EE5998B361D7789842CF46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ColorVersion_stricmp_strnicmp
                                  • String ID: system
                                  • API String ID: 3982287595-3377271179
                                  • Opcode ID: 555cd4da8e793616521b430ae76811c0b8ea33734ac1693bc979a2f34c02d0e3
                                  • Instruction ID: 36dc63b628da2f21dc090ec791cb3378c39fd4f4441e4ab25988a3752df79d79
                                  • Opcode Fuzzy Hash: 555cd4da8e793616521b430ae76811c0b8ea33734ac1693bc979a2f34c02d0e3
                                  • Instruction Fuzzy Hash: 1D51DF76A08315CFC705DF28E48462ABBE1FF94300F06896EE9848B351E734ED49DB82
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AsyncState$CursorMenuMetricsPopupSystemTrack
                                  • String ID:
                                  • API String ID: 1155494491-0
                                  • Opcode ID: a434eae8c7b03d926c5db9698b30b0402a057819a5c4da4a943dae7939715629
                                  • Instruction ID: d13fc269948df073aaa5453f92c02befc8a0da98ce515a81dcf8b556dbba3d33
                                  • Opcode Fuzzy Hash: a434eae8c7b03d926c5db9698b30b0402a057819a5c4da4a943dae7939715629
                                  • Instruction Fuzzy Hash: D65101756083559FC311EF29D584A5BBBF4BF88340F118A6EE9D88B361E730E9418F82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Infinity$in ShouldBankerRoundUp, trichotomy fails!$in ShouldBankerRoundUpToNext, trichotomy fails!$wrong digit!
                                  • API String ID: 0-950596978
                                  • Opcode ID: 8d14501fb45c43c780f83d2a074700ffb4c887ff78152a6f0cdfdd1fea58b427
                                  • Instruction ID: 294b169b2a520da65775f917df339af44e7ed8755dd56f85a7ac7db1f07c7b99
                                  • Opcode Fuzzy Hash: 8d14501fb45c43c780f83d2a074700ffb4c887ff78152a6f0cdfdd1fea58b427
                                  • Instruction Fuzzy Hash: D223447160C7808BC765EF19C49066EBBE2BBC9344F258D2EE8C987351D779E841CB4A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a480bbc9c190a6962b86e343e74dbf6eb3ffd87890a0106bd1f212a08c0c21dc
                                  • Instruction ID: ebf7126ee95b075f0827d7f011a74bfd6f81d4a7f8751ce2fdadd33f775449a0
                                  • Opcode Fuzzy Hash: a480bbc9c190a6962b86e343e74dbf6eb3ffd87890a0106bd1f212a08c0c21dc
                                  • Instruction Fuzzy Hash: 2D1238756087068FC718DF18C48062AFBE2BFD8354F59896DF8959B352DB30E946CB82
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSend$ErrorLastrecv
                                  • String ID:
                                  • API String ID: 3013662074-0
                                  • Opcode ID: 894b7f8d76cf593db6eb39d7844012baaa51a7d0b02ae400c8c2bdd345d6a7b9
                                  • Instruction ID: e2a6392a108e368238fabefe75f3e7e36af31a197edeb7ef2aa304a868dc331c
                                  • Opcode Fuzzy Hash: 894b7f8d76cf593db6eb39d7844012baaa51a7d0b02ae400c8c2bdd345d6a7b9
                                  • Instruction Fuzzy Hash: 3D3153716053009FD710AF68C5897ABBBE4AFC4368F10C95EEC9C8B396D778C8419B96
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Clipboard$CloseEmptyOpenOwner
                                  • String ID:
                                  • API String ID: 1113666267-0
                                  • Opcode ID: a418ae0caf4566a2b32d3bbad12f5fb60b5810407257e3d92e84c880c42a5f8b
                                  • Instruction ID: 99c7431e29b0dcb938450382a7efba85b82fa312d2e4a46478ec12ed6879d0b0
                                  • Opcode Fuzzy Hash: a418ae0caf4566a2b32d3bbad12f5fb60b5810407257e3d92e84c880c42a5f8b
                                  • Instruction Fuzzy Hash: 621194B45047058BCB41EF28D8C9A9ABBE0BF48341F054979EC88CF34AE674D9818F62
                                  Strings
                                  • Error in pixel height consistency while filling in spacesLeft, xrefs: 0042219E
                                  • Added too many new lines in UpdateDisplayInfo, xrefs: 00421F22
                                  • tk_textRelayout, xrefs: 00421D68, 004220B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Added too many new lines in UpdateDisplayInfo$Error in pixel height consistency while filling in spacesLeft$tk_textRelayout
                                  • API String ID: 0-995526656
                                  • Opcode ID: af581dc48a76f05fbe3f3afef20e1b7ef62814a08bd5002cdee321aa89362182
                                  • Instruction ID: 9dc5f6498a092525b607b455ac6a7937eccc8204bad76e216ba5e9eca3dfa998
                                  • Opcode Fuzzy Hash: af581dc48a76f05fbe3f3afef20e1b7ef62814a08bd5002cdee321aa89362182
                                  • Instruction Fuzzy Hash: EB224474708310DFC754CF19D180A1ABBE1BF98314F95896EE9898B362D778EC41CB8A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $unexpected token type in TclSubstTokens: %d
                                  • API String ID: 0-3341726691
                                  • Opcode ID: 7fc4b9cfdf031330c40542e15038d40ccf3c36cd38bbdfeff437ec1f879aec9b
                                  • Instruction ID: 7470d609336051007861cf9929df0a408ba08b41564a12e5e60b15d376181dc3
                                  • Opcode Fuzzy Hash: 7fc4b9cfdf031330c40542e15038d40ccf3c36cd38bbdfeff437ec1f879aec9b
                                  • Instruction Fuzzy Hash: 10F1E1B46093418FD764DF29C1807ABBBE1BFC8704F15892EE58987312DB39E845CB5A
                                  Strings
                                  • Bad tag priority being toggled off, xrefs: 004219F8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Bad tag priority being toggled off
                                  • API String ID: 0-2986709451
                                  • Opcode ID: 5048721477209e5e48ae81fef2f58ca53ef8472fca08a905f2a4d1f9ca10e37e
                                  • Instruction ID: aa15da95c813580db3d4bde52c904f19bc6c125738fadfb685505a6c6d933e51
                                  • Opcode Fuzzy Hash: 5048721477209e5e48ae81fef2f58ca53ef8472fca08a905f2a4d1f9ca10e37e
                                  • Instruction Fuzzy Hash: DDD20170608391CFD774CF19D080B9ABBE1BF88310F95896EE9998B352D734A845CF96
                                  Strings
                                  • TclCompileDictCmd(update): bad jump distance %d, xrefs: 004BDAF7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: TclCompileDictCmd(update): bad jump distance %d
                                  • API String ID: 0-2674825990
                                  • Opcode ID: 5c6d197d3a7cdbb07eefad93c08968a7d70d4080868d5d22b4db96d9aa17a872
                                  • Instruction ID: c30a34e64ea5c09d3e375a590511d692f1f2e1bcc381a0ae65b03bb4eb5fdfe4
                                  • Opcode Fuzzy Hash: 5c6d197d3a7cdbb07eefad93c08968a7d70d4080868d5d22b4db96d9aa17a872
                                  • Instruction Fuzzy Hash: B4821B74908781CFC714CF29C08065ABBF1BF99304F188A9EE9994B356E739E845CF96
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: abort
                                  • String ID:
                                  • API String ID: 4206212132-0
                                  • Opcode ID: 21839c0c8ad1afe0c43db60eaf06fde3b93e3e97a9f7cb49eed4a7caebd28c12
                                  • Instruction ID: cb4a3d79937e84809c4d6bfc1eee3714a15871ff05814a203e20ea1ded7e2361
                                  • Opcode Fuzzy Hash: 21839c0c8ad1afe0c43db60eaf06fde3b93e3e97a9f7cb49eed4a7caebd28c12
                                  • Instruction Fuzzy Hash: 6AB11335608B19CBC7159E68D4C027AFBD2BBC9314F78697ADA49CB342F2B29C05D781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d92b0b153c33c4beb4d608a96ae8f57837b2f3bf2b7dedd05a11cdc25792d8a
                                  • Instruction ID: 2f798ae5f393933c9c8734362d457ca7164f2fd7b78d3190dc1ac7bfcc70cb46
                                  • Opcode Fuzzy Hash: 3d92b0b153c33c4beb4d608a96ae8f57837b2f3bf2b7dedd05a11cdc25792d8a
                                  • Instruction Fuzzy Hash: C1C14B706043458FCB14CF1AC480A2AB7F1FF99305F58895EE8999B351DB35EC86CB96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7c96bd0522766e3a6d5344eef30f68e6f94d4fa46fc296695d6de99676d3a92
                                  • Instruction ID: f3bee30d3f4efb327355eeadb764c409fced566374a81348ab86ed4ee510047d
                                  • Opcode Fuzzy Hash: e7c96bd0522766e3a6d5344eef30f68e6f94d4fa46fc296695d6de99676d3a92
                                  • Instruction Fuzzy Hash: FF624774108385CFDB98CF19C480B6ABBA1AB56304F18C6AED8858F357E739D845CF96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d9fbc77a08230c38880f5c3294c40483af805ac3029f8b6a389c1160a9c6a349
                                  • Instruction ID: e7440fa66b5bcd937bd4fe4a44935d6dd1a999b7616696b7d03ee96e9964844f
                                  • Opcode Fuzzy Hash: d9fbc77a08230c38880f5c3294c40483af805ac3029f8b6a389c1160a9c6a349
                                  • Instruction Fuzzy Hash: 86621475A083018FC719CF19C584A1AF7E2FFCA304F168A6DE8999B265D770E945CF82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be67668498751aaa746fc194a36048f96c456b54133070ca36c45bbe9c782916
                                  • Instruction ID: 02e34e02ce0c97b8cf3790da0bc5863f43a9d5e62883907622044d7531bc9cee
                                  • Opcode Fuzzy Hash: be67668498751aaa746fc194a36048f96c456b54133070ca36c45bbe9c782916
                                  • Instruction Fuzzy Hash: 8712A471708A068FDB25DF38C895329BFD2BB85310F589979D44ADF346E638CC468B98
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45dea0005aabba407c4997c04db6426be55879dc35386bd8b165cfb6b45f72ab
                                  • Instruction ID: 5364b766e983d5d05e723db1ff6b80ad920fd7eb2c66f8eb604dd971beda1064
                                  • Opcode Fuzzy Hash: 45dea0005aabba407c4997c04db6426be55879dc35386bd8b165cfb6b45f72ab
                                  • Instruction Fuzzy Hash: 88321B74504341DFDB88CF29C084B5ABBE1BB95304F54C6AEE8898B346EB39D845CF96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0bdb63ec89887bfd0b1c36e7756cd7162e263ff89bd7f3d178d7f59af6f8074f
                                  • Instruction ID: 9109e63e58a3a9722c9e6efe7f4a47dd2b55a291ffa33f9c4cb412ce42c65d45
                                  • Opcode Fuzzy Hash: 0bdb63ec89887bfd0b1c36e7756cd7162e263ff89bd7f3d178d7f59af6f8074f
                                  • Instruction Fuzzy Hash: 87023B746087469FC748CF2AC084B5AFBE1BB94308F58C66ED4898B741D739E856CF86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d8e17bb22462cad7bcbe57c3753c49287fb4ad916971db4fcf2d258e00f271b8
                                  • Instruction ID: f6aeb9396eebcfe6713c8ce3e13c5aad9c520a35de09a13fc4124e880472d213
                                  • Opcode Fuzzy Hash: d8e17bb22462cad7bcbe57c3753c49287fb4ad916971db4fcf2d258e00f271b8
                                  • Instruction Fuzzy Hash: C3F12C746047418FD754DF29C080B5ABBE1BB96304F15CA6EE48A8B362E738E845CF56
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: memcmp
                                  • String ID:
                                  • API String ID: 1475443563-0
                                  • Opcode ID: 0b3cde24d8c8ceb8ba031ce11ace29d42f1667edc94912db720968004de36ee8
                                  • Instruction ID: 1584b7e806ec94fada076e1b00c0b98e26cf2fc00f3e663d51ebad3c1e25415a
                                  • Opcode Fuzzy Hash: 0b3cde24d8c8ceb8ba031ce11ace29d42f1667edc94912db720968004de36ee8
                                  • Instruction Fuzzy Hash: F9E14D79504242DFDB48CF29C084B5ABBE2BB95304F18C6AED8894B34AE739DC45CF95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 725faf9874b4775ce4e0028c5953913c09e3987e8c69b07a948bbad12cdd000b
                                  • Instruction ID: 4d29d52ff657faf10ddcd17e2a99c65db444b84d73c809d2346c9becb8fe6550
                                  • Opcode Fuzzy Hash: 725faf9874b4775ce4e0028c5953913c09e3987e8c69b07a948bbad12cdd000b
                                  • Instruction Fuzzy Hash: EA31D07170C3294BCB149D5D94E426AFBD7BBC8320F55C63DA99987780DAF09C09C681
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: wsprintf$CommStatesprintf
                                  • String ID: %d,%c,%d,%s$-lasterror$-mode$-pollinterval$-queue$-sysbuffer$-ttystatus$-xchar$1.5$BREAK$CTS$DCD$DSR$FRAME$OVERRUN$RING$RXOVER$RXPARITY$TIMEOUT$TXFULL$can't get comm state$can't get tty status$mode pollinterval lasterror queue sysbuffer ttystatus xchar
                                  • API String ID: 1363856925-2426844971
                                  • Opcode ID: 80edcb27f15fb239f263c868a4beb7bc142ce116e9d23db0a796f1509ad88d21
                                  • Instruction ID: 28e604963c4654fc5b19c0fff0564a59144420095c3ad6a40b55fad9a89124f0
                                  • Opcode Fuzzy Hash: 80edcb27f15fb239f263c868a4beb7bc142ce116e9d23db0a796f1509ad88d21
                                  • Instruction Fuzzy Hash: 2D1216749097518BEB24AF25C595A6EBBF0BF84704F118C2FECC89B341D77898858B4B
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Text$ColorCompatibleCreate$AlignBitmapExtentMetricsModeObjectPointSelect
                                  • String ID: b$unexpected drawable type in stipple
                                  • API String ID: 4132130283-268975484
                                  • Opcode ID: bb50da25a97b27446b9e8bfb68692c9a9c17ef63f01b02bdb523996383196594
                                  • Instruction ID: f88c6bac4c8473eea8a67e5db106b158b433206a9f89ef3d0a79a54189957deb
                                  • Opcode Fuzzy Hash: bb50da25a97b27446b9e8bfb68692c9a9c17ef63f01b02bdb523996383196594
                                  • Instruction Fuzzy Hash: 7CF16AB59097419FD350EF68D585A1EFBF0BF89700F41892EF88887316E774A9498F82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: getenv
                                  • String ID: 8.5$8.5.12$::bitrock_cmd_exec_path$::errorCode$::errorInfo$::tcl::Bgerror$::tcl::bitrock::waitPidOriginalCode$::tcl::mathfunc$::tcl::mathfunc::$::tcl::mathop$::tcl::mathop::$::tcl::unsupported::disassemble$Can't create math function namespace$TCL_INTERP_DEBUG_FRAME$TCL_PKG_PREFER_LATEST$Tcl$Tcl_CreateInterp: can't create global namespace$Tcl_CreateInterp: failed to push the root stack frame$abs$builtin command with NULL object command proc and a NULL compile proc$byteOrder$can't create math operator namespace$cant create cmd location$failed to create math operator %s$littleEndian$pointerSize$q$tcl_patchLevel$tcl_platform$tcl_precision$tcl_version$threaded$wordSize
                                  • API String ID: 498649692-1967448186
                                  • Opcode ID: 13f8a168660ccb520bd9100a6979e8d6abef35f4ceb4fc3ef98b2c5ae0220ecf
                                  • Instruction ID: 87ced53b32016bc8967353993ca8654953d14bc48a9cdd5f6af81599f562fbdb
                                  • Opcode Fuzzy Hash: 13f8a168660ccb520bd9100a6979e8d6abef35f4ceb4fc3ef98b2c5ae0220ecf
                                  • Instruction Fuzzy Hash: 6132B3B04087019FEB40EF26C18975ABFE0BF44308F05886EE8998F356D7B99448DF96
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Object$Select$BrushCreateDeleteFillModePolySolid
                                  • String ID: $unexpected drawable type in stipple
                                  • API String ID: 1559031647-2568577462
                                  • Opcode ID: 69d1a6c3ac3d78e379acbe4f3ba373bbece44c4a18fbb6c854de93823b11020b
                                  • Instruction ID: 469ac65cb00bbb35b83a63ecccb28b74a4c5df16f48d5dbae1df2bf3289716d7
                                  • Opcode Fuzzy Hash: 69d1a6c3ac3d78e379acbe4f3ba373bbece44c4a18fbb6c854de93823b11020b
                                  • Instruction Fuzzy Hash: 43F18EB59097419FC314EF69D58962EFBF0BF89701F11892EE98887311E775E8488F82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Create$Event$Thread$Console$ModePriority$sprintfstrcpywsprintf
                                  • String ID: -encoding$-eofchar$-translation$auto$cp%d$file%x$unicode$~X
                                  • API String ID: 3857395832-745398566
                                  • Opcode ID: cb9a1d0687231d3da4c08f386648dcca0e572970b40c87e02c8058af843a2799
                                  • Instruction ID: 04fcf6301d268997e620cc45aefd5d5af252a452203ecc9e03e3a16044fd35b7
                                  • Opcode Fuzzy Hash: cb9a1d0687231d3da4c08f386648dcca0e572970b40c87e02c8058af843a2799
                                  • Instruction Fuzzy Hash: 91718EB08093019FD740AF29C19931ABFF4BB84758F50C95EE8D88B346D7B998489F97
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: inet_ntoa$getsocknamehtons
                                  • String ID: -error$-peername$-sockname$can't get peername: $can't get sockname: $peername sockname$winsock is not initialized
                                  • API String ID: 582103380-916657730
                                  • Opcode ID: e52a224064b9bc8a2d23785a70cc681e385191c2e7ca0fe1b2a6bffb90d63ce2
                                  • Instruction ID: 4b6582cb13feab0098a54fe932ed0c4f609d1f42bf8f18d235231aa5bbcd9196
                                  • Opcode Fuzzy Hash: e52a224064b9bc8a2d23785a70cc681e385191c2e7ca0fe1b2a6bffb90d63ce2
                                  • Instruction Fuzzy Hash: 53D106B49087419BD724AF75C1856AFBBE4AF84348F50CC2EE8CD8B312E779D8458B46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strtol$_isctype
                                  • String ID: safe interpreter$": $-encoding$-translation$_$_height$_width$_x_hot$_y_hot$binary$can't get bitmap data from a file in a$char$couldn't read bitmap file "$format error in bitmap data$format error in bitmap data; $looks like it's an obsolete X10 bitmap file${
                                  • API String ID: 1974057756-345731348
                                  • Opcode ID: 1cf599c566255a1b2675ac7819a338a7c7e9a68059cf823b1bf35192de25328c
                                  • Instruction ID: 6135240200b41c82dfd3ce81f283274e67fc87e51d3dc9f3268941ddaa07bbcd
                                  • Opcode Fuzzy Hash: 1cf599c566255a1b2675ac7819a338a7c7e9a68059cf823b1bf35192de25328c
                                  • Instruction Fuzzy Hash: 4EE10970208740DFD722DF28C49469BBBF5BF99744F11CA2DE8888B264EB75D848CB52
                                  APIs
                                  Strings
                                  • Directory '%.200s' does not exist,please select or enter an existing directory., xrefs: 003C866D
                                  • 0, xrefs: 003C8684
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID: 0$Directory '%.200s' does not exist,please select or enter an existing directory.
                                  • API String ID: 1378638983-651362749
                                  • Opcode ID: 27b43f2f302add10ad8080b8cede153b631500e8f3bc951cb2403659bcad33c8
                                  • Instruction ID: 3756395a6dfd8d29de354ac852c1aa1038426de53c6b54cdccd6c46d0980eb68
                                  • Opcode Fuzzy Hash: 27b43f2f302add10ad8080b8cede153b631500e8f3bc951cb2403659bcad33c8
                                  • Instruction Fuzzy Hash: 05A1E2B15087019FD301AF28C588B5EBBE4FF84754F01892EE8D88B251E7759A89CF93
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (processing arguments in argv variable)$-class$-colormap$-screen$-use$-visual$8.5$8.5.12$::safe::TkInit$DISPLAY$NULL master$Tcl$argc$argv$env$error in Tcl_GetInterpPath$geometry$if {[namespace which -command tkInit] eq ""} { proc tkInit {} { global tk_library tk_version tk_patchLevel rename tkInit {} tcl_findLibrary tk $tk_version $tk_patchLevel tk.tcl TK_LIBRARY tk_library }}tkInit$not allowed to start Tk by master's safe::TkInit$toplevel$wm geometry .
                                  • API String ID: 0-621725416
                                  • Opcode ID: 3602ddfc6ddfd49c4e3c3f1c1bcd7b51a18aeba5501c5b3e717232dd5c6c0c78
                                  • Instruction ID: f0d8ca3c2d9c7343f0783d87b72b62b680d7473cd37046106bbf1ac51a720681
                                  • Opcode Fuzzy Hash: 3602ddfc6ddfd49c4e3c3f1c1bcd7b51a18aeba5501c5b3e717232dd5c6c0c78
                                  • Instruction Fuzzy Hash: E712CFB0109741DFE314DF29D888B5ABBF4BF98706F11892EE8D88B264D7759848DF42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CountTick
                                  • String ID: $ $&$CLIPBOARD$WM_DELETE_WINDOW$WM_PROTOCOLS
                                  • API String ID: 536389180-3391022383
                                  • Opcode ID: 9eb8e4b35df8868aa4534edd4c3171a6e266bbc184ee552b3f0257820877a6e7
                                  • Instruction ID: 46b536ee647beedf1e62dc3050d51fe91681fc51be09e195797df1673fbafb87
                                  • Opcode Fuzzy Hash: 9eb8e4b35df8868aa4534edd4c3171a6e266bbc184ee552b3f0257820877a6e7
                                  • Instruction Fuzzy Hash: 2E124BB15097818FEB36DF28C5987AEBBE1BB84304F55892EE4C987691D77488C4CB43
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: [$# $# %s$%%v%u $%+d $%d $%u $&$(%u) %s $, %u cmds start here$FormatInstruction: bad local var index %u (%u locals)$end $end-%d $next cmd at pc %u$pc %u$temp var %u$var
                                  • API String ID: 590974362-1797526313
                                  • Opcode ID: cee557de5c9243c8ad2622780f171bc86b6333ff4b17007d347a42301c886b88
                                  • Instruction ID: 781b1b9a6a0b4a48e5bba5fa34c023996ee8eab36bff3b97d3685fe5c4ea3cb1
                                  • Opcode Fuzzy Hash: cee557de5c9243c8ad2622780f171bc86b6333ff4b17007d347a42301c886b88
                                  • Instruction Fuzzy Hash: 4102FF749183409FD314DF29C08462ABBF1BFC9318F148A6EF8A997352C379E946CB46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _isctype
                                  • String ID: while processing open access modes "$" not supported by this system$": must be RDONLY, WRONLY, RDWR, APPEND, BINARY, CREAT, EXCL, NOCTTY, NONBLOCK, or TRUNC$APPEND$BINARY$CREAT$EXCL$NOCTTY$NONBLOCK$RDONLY$RDWR$TRUNC$WRONLY$access mode "$access mode must include either RDONLY, WRONLY, or RDWR$illegal access mode "$invalid access mode "
                                  • API String ID: 162844146-2411178476
                                  • Opcode ID: ffe058e9d4e32d09d98e8b179509f5ef803fec25467e4bd0db09a85c2bc1cdc8
                                  • Instruction ID: 61587e38e17f9263a6f673a27bb69034975709771a56032f462d83f0ac0bc45b
                                  • Opcode Fuzzy Hash: ffe058e9d4e32d09d98e8b179509f5ef803fec25467e4bd0db09a85c2bc1cdc8
                                  • Instruction Fuzzy Hash: E0B1A375508B448FD720AF55C49422BBBE1BBC5324F648A1FE8A45B390E378DC46CB8B
                                  APIs
                                  Strings
                                  • 0, xrefs: 003C8291
                                  • Directory '%.200s' does not exist,please select or enter an existing directory., xrefs: 003C827A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Message$Send$CurrentDirectoryPath$FromFullListNameUpdateWindowlstrcpynwsprintf
                                  • String ID: 0$Directory '%.200s' does not exist,please select or enter an existing directory.
                                  • API String ID: 4045521433-651362749
                                  • Opcode ID: 75822b35a5e92043ddda9151a660e2a11e890a08f972bd01a09d3ac195b5c97e
                                  • Instruction ID: c772297d7fd98cf7521157f9976f5e813a33da18a03e943aebe30e87ab438281
                                  • Opcode Fuzzy Hash: 75822b35a5e92043ddda9151a660e2a11e890a08f972bd01a09d3ac195b5c97e
                                  • Instruction Fuzzy Hash: E5A113B55083419FD301AF29C588B6EBBE4FF84344F01892EE8C88B251DB789989CF53
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ": it is a transient$": override-redirect flag is set$: it is an icon for $: the container does not support the request$argument$can't change state of $can't iconify "$icon$iconic$normal$unexpected index$window ?state?$withdrawn$wm state not matched$zoomed
                                  • API String ID: 0-4202683283
                                  • Opcode ID: ae473b19dc8d10dcd4148ccd73af5f703b672d2288b38b3494c585a8d978ad24
                                  • Instruction ID: 8de40007afa65ea84b3aaf73d33956917e5689a0d86f25c7002aaa08b1d39667
                                  • Opcode Fuzzy Hash: ae473b19dc8d10dcd4148ccd73af5f703b672d2288b38b3494c585a8d978ad24
                                  • Instruction Fuzzy Hash: A1B114B0118340DFE722DF29C49872ABBE4BF88315F15D92EE8D98B251D378D848DB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _isctype
                                  • String ID: have the same number of elements$%1x%1x%1x$%2x%2x%2x$all elements of color list must$can't parse color "$data ?options?
                                  • API String ID: 162844146-1809874090
                                  • Opcode ID: 826d64e16c3d06dfb353b298fecdf3e3b7890c2a3fb8443574f69c9201c6cf0a
                                  • Instruction ID: b0ab1cc92322b10a3c8484a98670232ccac013a37bcee6a1a7a949557820a8a7
                                  • Opcode Fuzzy Hash: 826d64e16c3d06dfb353b298fecdf3e3b7890c2a3fb8443574f69c9201c6cf0a
                                  • Instruction Fuzzy Hash: 0F22F075608381CFD725CF28C484BAABBE5BB88304F14896EE9D98B351DB35D848CF52
                                  APIs
                                    • Part of subcall function 003D1D50: CreateCompatibleDC.GDI32 ref: 003D1D72
                                    • Part of subcall function 003D1D50: SelectObject.GDI32(?), ref: 003D1D84
                                    • Part of subcall function 003D1D50: GetBkMode.GDI32(?,?,?,?,00000000,00000000,?,003D2A80), ref: 003D1DA0
                                  • SetBkColor.GDI32 ref: 003E41EA
                                  • SetTextColor.GDI32 ref: 003E41FB
                                  • CreateCompatibleDC.GDI32 ref: 003E4206
                                  • LoadBitmapA.USER32(?), ref: 003E4221
                                  • SelectObject.GDI32 ref: 003E4232
                                  • GetMapMode.GDI32 ref: 003E423D
                                  • SetMapMode.GDI32 ref: 003E424A
                                  • GetObjectA.GDI32 ref: 003E4265
                                  • DPtoLP.GDI32 ref: 003E4290
                                  • DPtoLP.GDI32 ref: 003E42BB
                                  • BitBlt.GDI32 ref: 003E4361
                                  • DeleteDC.GDI32 ref: 003E436C
                                  • DeleteObject.GDI32 ref: 003E4375
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Object$Mode$ColorCompatibleCreateDeleteSelect$BitmapLoadText
                                  • String ID:
                                  • API String ID: 2408734242-3916222277
                                  • Opcode ID: 2f06866a062082eb67216ec177c4696a58485debcddb878df911ddf75d7d7856
                                  • Instruction ID: 86ab8dbfa5090d783885ffa649878ae7208f18b9586b1e516a2e850ee1176a46
                                  • Opcode Fuzzy Hash: 2f06866a062082eb67216ec177c4696a58485debcddb878df911ddf75d7d7856
                                  • Instruction Fuzzy Hash: B071C0B49087859FC350EF69C58565EBFE0BFC9700F408A2DF98887356E774A9498F82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: window keySym$y
                                  • API String ID: 0-1804923131
                                  • Opcode ID: 4d312edaaf9584483b3d97610bed69e5390eb782af6bc164963e4412bb26fd2c
                                  • Instruction ID: 77ad4723804ae7b11163b149b1b664c0897f960696dafd01f4cc4c37a7921592
                                  • Opcode Fuzzy Hash: 4d312edaaf9584483b3d97610bed69e5390eb782af6bc164963e4412bb26fd2c
                                  • Instruction Fuzzy Hash: CCA128B19087518FE711AF69C58971FBFE0AF89350F12892DE4C88B295D778C844DB93
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $-blocking$-buffering$-buffersize$-encoding$-eofchar$-translation$auto$binary$crlf$full$line$none
                                  • API String ID: 0-4267506929
                                  • Opcode ID: fd58bc0322bf041941a3a7b380df677691f6540f3f94b29a56198243c27ecde1
                                  • Instruction ID: 127bd35cb13bb04a055c7529873d4b312bf64eaccc2206eba6812800f5e35f3d
                                  • Opcode Fuzzy Hash: fd58bc0322bf041941a3a7b380df677691f6540f3f94b29a56198243c27ecde1
                                  • Instruction Fuzzy Hash: 9702E8B45083418BD728EF55D180A2EFBE1AF88304F25985FF8895B342DB39D849DB97
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CapsDevice$Release
                                  • String ID: h
                                  • API String ID: 1035833867-2439710439
                                  • Opcode ID: e7914b0c65766e409453de1be4573e9e902ec1b45f7dfcb7147d39cc14c56595
                                  • Instruction ID: 69780aae0df09e186e0a883732427fc14056043a1ffa1ec536187bd07f5dc647
                                  • Opcode Fuzzy Hash: e7914b0c65766e409453de1be4573e9e902ec1b45f7dfcb7147d39cc14c56595
                                  • Instruction Fuzzy Hash: 1961F6B04047018FDB51EF28C288B1ABFE0BF85314F52855DE8888F266D779C949DF96
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: %d$%.15g setlinewidth$StrokeClip $[%d$[] 0 setdash$] %d setdash$stroke
                                  • API String ID: 590974362-3245722297
                                  • Opcode ID: 215a825417507111741c7cf51cfdb177a56b35e68ef11e6532f8333b65e07558
                                  • Instruction ID: ae424be7effddc3e639f3af866d58dd9d60fc1a78baaef6425a913acee60ed3f
                                  • Opcode Fuzzy Hash: 215a825417507111741c7cf51cfdb177a56b35e68ef11e6532f8333b65e07558
                                  • Instruction Fuzzy Hash: FBF1EE75608341DFC355DF28E484A6ABBE5FF89354F118A6EE4C98B3A1D730E884CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strpbrk
                                  • String ID: " into itself$" tries to import from namespace "$*[?\$LOOKUP$NAMESPACE$TCL$auto_import$empty import pattern$import pattern "$no namespace specified in import pattern "$unknown namespace in import pattern "
                                  • API String ID: 3024680390-3316406536
                                  • Opcode ID: 19e87487c5eadcafb077da224884233444ffdcac811c83a1d775dc91f3029df8
                                  • Instruction ID: f1c5387cdf453e09c95f33b20e5116f9995664dcb61d86183cf21ede900ca6f1
                                  • Opcode Fuzzy Hash: 19e87487c5eadcafb077da224884233444ffdcac811c83a1d775dc91f3029df8
                                  • Instruction Fuzzy Hash: 4AC1C0B49097419FD710EF29C084A1EBBE0BF88358F148D2EE9A89B361D778D845CF46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _errno
                                  • String ID: " doesn't exist$" pointing to "$": $": no such file or directory$": target "$": that path already exists$?-linktype? linkname ?target?$could not create new link "$could not read link "$switch
                                  • API String ID: 2918714741-519649707
                                  • Opcode ID: 5cc2a3eb622d77e62ed93f4dc60ff1e12e2766cabc727201f5ed5a3630208712
                                  • Instruction ID: af7145354324566802b55d067bf534ae70a92b42b968573798d27062b771272c
                                  • Opcode Fuzzy Hash: 5cc2a3eb622d77e62ed93f4dc60ff1e12e2766cabc727201f5ed5a3630208712
                                  • Instruction Fuzzy Hash: 7791D4B8508702DFD750AF29C48471ABBE4BF84348F15892EE4999B311E778D845CF8A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWidememmove$wcschr
                                  • String ID: "*:<>?|$/$\$\$\$\\?\$\\?\UNC
                                  • API String ID: 1282107690-3555148050
                                  • Opcode ID: e7d703b2c5d195482af1982e493dd8d29b2f472af90c34f43a960c45409f7c01
                                  • Instruction ID: 13ba14b02892d758873f655cbfc58b941a40e62b73d534a53a92b74bf0d24474
                                  • Opcode Fuzzy Hash: e7d703b2c5d195482af1982e493dd8d29b2f472af90c34f43a960c45409f7c01
                                  • Instruction Fuzzy Hash: 9B51A0708143458ADB20AF65C0A436ABBE2AF42754F44892FE8D8DB381D7788C49E75B
                                  APIs
                                  • sprintf.MSVCRT ref: 00415699
                                  • sprintf.MSVCRT ref: 004156E0
                                  • sprintf.MSVCRT ref: 004157EA
                                  • sprintf.MSVCRT ref: 00415824
                                    • Part of subcall function 003D981C: sprintf.MSVCRT ref: 003D98AD
                                    • Part of subcall function 003D981C: sprintf.MSVCRT ref: 003D9931
                                    • Part of subcall function 003D981C: sprintf.MSVCRT ref: 003D996D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: arcsetmatrix0 setlinecap$0 0 1 %.15g %.15g$0 0 1 %.15g %.15g arc closepathsetmatrix$0 0 moveto 0 0 1 %.15g %.15g arc closepathsetmatrix$clip $fill$grestore gsave$matrix currentmatrix%.15g %.15g translate %.15g %.15g scale
                                  • API String ID: 590974362-3069301327
                                  • Opcode ID: 6409f087219ba39f4d6ff100782700f2a299d1f0dc6b9ccc6b6209768fed56f1
                                  • Instruction ID: 0082fead373d806d31ee2e67dde8f1b44a75ac41d3c1a394dc724141a063c2a4
                                  • Opcode Fuzzy Hash: 6409f087219ba39f4d6ff100782700f2a299d1f0dc6b9ccc6b6209768fed56f1
                                  • Instruction Fuzzy Hash: 16F102B0508B44DFD311AF18D4886AEBBF4FF88740F51886EE4C88B365DB758894DB86
                                  APIs
                                    • Part of subcall function 0047712C: WaitForSingleObject.KERNEL32 ref: 004771C9
                                    • Part of subcall function 0047712C: GetExitCodeProcess.KERNEL32 ref: 004771ED
                                    • Part of subcall function 0047712C: CloseHandle.KERNEL32 ref: 00477243
                                  • sprintf.MSVCRT ref: 004E02B3
                                  • _errno.MSVCRT ref: 004E034A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CloseCodeExitHandleObjectProcessSingleWait_errnosprintf
                                  • String ID: %lu$CHILDKILLED$CHILDSTATUS$child killed: $child process exited abnormally$child process lost (is SIGCHLD ignored or trapped?)$error reading stderr output file: $error waiting for process to exit:
                                  • API String ID: 3881583774-3428309823
                                  • Opcode ID: a7d90995a3783a3a34e1ded73a1b8f1e3deb36615e9e91146eb2343b02b146d1
                                  • Instruction ID: 48bafa4d91e62a537b98b85af5b1bb1cdec3df8029bfe55430c5e47b735c5d09
                                  • Opcode Fuzzy Hash: a7d90995a3783a3a34e1ded73a1b8f1e3deb36615e9e91146eb2343b02b146d1
                                  • Instruction Fuzzy Hash: B281DFB05083849FD710AF26C18575FBBE4BF85358F15881EE9A89B352D7B898848F4B
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: floor
                                  • String ID:
                                  • API String ID: 3192247854-0
                                  • Opcode ID: 5edfb6088a2d8fb70de94ae8021f39318e676debe71915dcd325d1f826ecd590
                                  • Instruction ID: 28755e361d1d004c897cc6dd9d3d34e5ada734e8a6482422b6d08bd1029d389f
                                  • Opcode Fuzzy Hash: 5edfb6088a2d8fb70de94ae8021f39318e676debe71915dcd325d1f826ecd590
                                  • Instruction Fuzzy Hash: F881C1B2908E55D3D7023F15F90C399BBB4FBC5391F220D89E1C9101E6EF364868978A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Create$EventThread$ClassErrorLastObjectPriorityRegisterSingleWait
                                  • String ID: TclSocket
                                  • API String ID: 4237241392-1749961011
                                  • Opcode ID: 31071c18911c2abe3537f2c066f130a79633fef0a00fc704ecbd8225bad643f0
                                  • Instruction ID: a9bc9e9498680d15e8d95a3e29caec6e19c62ef8c16976b41e9306b8e4622cef
                                  • Opcode Fuzzy Hash: 31071c18911c2abe3537f2c066f130a79633fef0a00fc704ecbd8225bad643f0
                                  • Instruction Fuzzy Hash: 215108B04093429BEB04BF69D49936ABFE0BB84308F41C91EE4D84B281D7BDC449DB5B
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Virtual$Protectmemcpy$Queryabortfwritevfprintf
                                  • String ID: @$Mingw runtime failure:
                                  • API String ID: 978211760-2549925133
                                  • Opcode ID: aad30c224b03e8c3b36f4ee2b96a477ceaf658c2599659876f360bec94f10925
                                  • Instruction ID: 86d52e0dc1e910916666fc5bd2dcdf896755dd4c68d593881b8fedbad8011544
                                  • Opcode Fuzzy Hash: aad30c224b03e8c3b36f4ee2b96a477ceaf658c2599659876f360bec94f10925
                                  • Instruction Fuzzy Hash: 9D3188B48193869BD700EF29C18961EFFE0BB88744F45881EF8D897211D6B4E9889F42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: #%d$cell$command$command x y$heading$item$nothing$row$separator
                                  • API String ID: 590974362-1957357900
                                  • Opcode ID: 82ad8ddd8d175920616c8fc3fc432070804f0d393a5100de51366167f6c5f65e
                                  • Instruction ID: 366cb6c73439bc31d847b140221f1592178c7a3a7844a063c2622442b3fcd526
                                  • Opcode Fuzzy Hash: 82ad8ddd8d175920616c8fc3fc432070804f0d393a5100de51366167f6c5f65e
                                  • Instruction Fuzzy Hash: DD1201B5608341CFC350DF28C484B6ABBE0BF89314F558A2EE999A73A1D734E845CB46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: $%04X$($($::tk::psglyphs$[$\$\%03o$t
                                  • API String ID: 590974362-2214434871
                                  • Opcode ID: 26047eebdb36cf2e61e9bdfcc611bb4cb4e553e2e22122c8b03556f37be478d3
                                  • Instruction ID: aa3e076ad97d1408cb708444d3044f8175f06d7d09a83bc400abdad3d8e9652f
                                  • Opcode Fuzzy Hash: 26047eebdb36cf2e61e9bdfcc611bb4cb4e553e2e22122c8b03556f37be478d3
                                  • Instruction Fuzzy Hash: F7A123742087829FD725DF18D088B9BBBF1AFC9349F548D6DE4C88B251D375D8488B82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: " doesn't exist$-$failed to allocate font due to $font "$gfff$internal system font engine problem$unknown font style "
                                  • API String ID: 0-1823368467
                                  • Opcode ID: 02deebb6dc2726340098d03b071dd3784f66a89e5a60c6b611c685dd3c7ade68
                                  • Instruction ID: 84c7cc722e6c2d115ad10478414ce8e5dda199ccd968328dbdd70fd421f2511a
                                  • Opcode Fuzzy Hash: 02deebb6dc2726340098d03b071dd3784f66a89e5a60c6b611c685dd3c7ade68
                                  • Instruction Fuzzy Hash: C022DF74608702DFD751DF29C484A6ABBF4BF89341F11896EE8999B360E770E845CF82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _isctype$strncmp
                                  • String ID: ": class must be $bad X identifier for visual: "$couldn't find an appropriate visual$default$or default$unknown or ambiguous visual name "
                                  • API String ID: 1540279034-3671163074
                                  • Opcode ID: b49ff974792014349382c0e3c2a3688ed03ebcaf6f3b3326e4dd22ff5b9375cc
                                  • Instruction ID: e18bc684c79de7694b51c350c819da86c48ac2e3511ad8f8abc8e11ad1f307b7
                                  • Opcode Fuzzy Hash: b49ff974792014349382c0e3c2a3688ed03ebcaf6f3b3326e4dd22ff5b9375cc
                                  • Instruction Fuzzy Hash: C7122476608351CFC725CF18E480A6ABBE1FF89314F16896EE8D99B351E731E845CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Palette$CapsDeviceEntriesIndexNearestRelease
                                  • String ID: &$Tried to free a color that isn't allocated.
                                  • API String ID: 2328700599-1597625102
                                  • Opcode ID: d99531fbd51a7abaa34738359a9e6b2448c3e4f73d09c678bd4aa15da8270a85
                                  • Instruction ID: f62f00f73a07e6290891156c3e2b2e2c1c283ec9d0bb9d51af179d60aaa13b18
                                  • Opcode Fuzzy Hash: d99531fbd51a7abaa34738359a9e6b2448c3e4f73d09c678bd4aa15da8270a85
                                  • Instruction Fuzzy Hash: 3951BEB55083019FC344EF29E584A2ABBF0FB88341F118A6EE8E997311E734E954DF52
                                  APIs
                                  Strings
                                  • bad variable name ", xrefs: 004559B0
                                  • (, xrefs: 0045580B
                                  • ObjMakeUpvar called with an index outside from a proc, xrefs: 004558B8
                                  • " has traces: can't use for upvar, xrefs: 00455914
                                  • can't upvar from variable to itself, xrefs: 0045596C
                                  • " already exists, xrefs: 004558DC
                                  • create, xrefs: 0045588C
                                  • variable ", xrefs: 004558E8
                                  • ": upvar won't create a scalar variable that looks like an array element, xrefs: 004559A4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strchr
                                  • String ID: " already exists$" has traces: can't use for upvar$": upvar won't create a scalar variable that looks like an array element$($ObjMakeUpvar called with an index outside from a proc$bad variable name "$can't upvar from variable to itself$create$variable "
                                  • API String ID: 2830005266-230799844
                                  • Opcode ID: d3497f8b25759c54c25cf817f23b7139931e54e087de6035a50256880450436b
                                  • Instruction ID: 174427008df420386e176d2afc470f571f242a6e058cd6aa0445127d5ddf2aa9
                                  • Opcode Fuzzy Hash: d3497f8b25759c54c25cf817f23b7139931e54e087de6035a50256880450436b
                                  • Instruction Fuzzy Hash: 1E6137B4608B45CFD710EF65C09462BBBE0FF88315F14895EE8894B352D7B8D849DB86
                                  APIs
                                  Strings
                                  • 50 dict beginsavegsave, xrefs: 004184E4
                                  • 0 %d moveto %d 0 rlineto 0 -%d rlineto -%d, xrefs: 00418526
                                  • %%%% %s item (%s, %d x %d)%.15g %.15g translate, xrefs: 00418334
                                  • %s postscript -prolog 0, xrefs: 004183A9
                                  • restoreend, xrefs: 00418558
                                  • 0 rlineto closepath, xrefs: 00418570
                                  • 1.000 1.000 1.000 setrgbcolor AdjustColorfillgrestore, xrefs: 00418568
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf$Pixel
                                  • String ID: %%%% %s item (%s, %d x %d)%.15g %.15g translate$restoreend$ 0 rlineto closepath$%s postscript -prolog 0$0 %d moveto %d 0 rlineto 0 -%d rlineto -%d$1.000 1.000 1.000 setrgbcolor AdjustColorfillgrestore$50 dict beginsavegsave
                                  • API String ID: 386733100-2784619735
                                  • Opcode ID: 7284b807e8ce1d40d80517026535ebe8b7968f13bef9ea481f57eddda42a124a
                                  • Instruction ID: bf84589455e3779b6e2d00783afc7dfbab0073c1890015a24ca85c9d2f601c28
                                  • Opcode Fuzzy Hash: 7284b807e8ce1d40d80517026535ebe8b7968f13bef9ea481f57eddda42a124a
                                  • Instruction Fuzzy Hash: FB818AB5508345DFC350DF28E488A9ABBF4BF88354F51896EF8988B361D77099489F82
                                  APIs
                                  Strings
                                  • %d entries in table, %d buckets, xrefs: 004709B3
                                  • average search distance for entry: %.1f, xrefs: 00470A44
                                  • number of buckets with %d entries: %d, xrefs: 004709EC
                                  • number of buckets with %d or more entries: %d, xrefs: 00470A1F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf$Heap$AllocProcess
                                  • String ID: %d entries in table, %d buckets$average search distance for entry: %.1f$number of buckets with %d entries: %d$number of buckets with %d or more entries: %d
                                  • API String ID: 399757916-2019991733
                                  • Opcode ID: 9800f0328559b12a92f828c3a703abad53fba6c1e1d2715c40758ae6227d33e2
                                  • Instruction ID: 2d2b7fd59b7183db9b12fd7215564dbd4b8846d93d37111397ba91e236dbc79b
                                  • Opcode Fuzzy Hash: 9800f0328559b12a92f828c3a703abad53fba6c1e1d2715c40758ae6227d33e2
                                  • Instruction Fuzzy Hash: 9E5168B0609306CFD710EF24C48469BBBE4FF94394F25891EF89987252E774D8489B86
                                  APIs
                                  • ImmGetContext.IMM32 ref: 00394545
                                  • ImmGetCompositionStringA.IMM32 ref: 00394582
                                  • ImmGetCompositionStringA.IMM32 ref: 003945D4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CompositionString$Context
                                  • String ID: unicode
                                  • API String ID: 3778118417-3551638624
                                  • Opcode ID: 9bc516e550686daefc5e0cda9071cd8945d31ce630b6974a50a864a8e6541e8c
                                  • Instruction ID: ee21a596b32a5d237950a6892627dc55ce5a841217f602f784b894eac3ec0db7
                                  • Opcode Fuzzy Hash: 9bc516e550686daefc5e0cda9071cd8945d31ce630b6974a50a864a8e6541e8c
                                  • Instruction Fuzzy Hash: 2B8106B55083458FD710EF28D48865ABBE4FF89350F12892DE8A88B361E734D949CF92
                                  APIs
                                  Strings
                                  • ., xrefs: 003655BC
                                  • ., xrefs: 00365593
                                  • bad window path name ", xrefs: 00365736
                                  • can't create window: its parent has -container = yes, xrefs: 00365718
                                  • can't create window: parent has been destroyed, xrefs: 003656E8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strncpy$strrchr
                                  • String ID: .$.$bad window path name "$can't create window: its parent has -container = yes$can't create window: parent has been destroyed
                                  • API String ID: 1611681577-2829841010
                                  • Opcode ID: e2fc614e7a9d235c49c0c5558c23b5773d5a934a90d80fc2ba4a34b8310b1fd3
                                  • Instruction ID: 5eedebd576720a6d60866f0347b0bda880bd56c3e173018b211662a925371757
                                  • Opcode Fuzzy Hash: e2fc614e7a9d235c49c0c5558c23b5773d5a934a90d80fc2ba4a34b8310b1fd3
                                  • Instruction Fuzzy Hash: C351E1B4608B409FC701DF29C48865AFBE5BF89344F55C92EE8C98B319EB70D845CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strtoul
                                  • String ID: ": must be widgetDefault, startupFile, userDefault, $bad priority level "$interactive$interactive, or a number between 0 and 100$startupFile$userDefault$widgetDefault
                                  • API String ID: 3805803174-1055847276
                                  • Opcode ID: 24eaf3820939d02ea14c78ebb7caebde6452241fc139367f54a975a62cbf9d6b
                                  • Instruction ID: 3b52b0ab1521df531ceaa642f1f1c7268c6e366aeadb7233a5c6cf821ecaccdb
                                  • Opcode Fuzzy Hash: 24eaf3820939d02ea14c78ebb7caebde6452241fc139367f54a975a62cbf9d6b
                                  • Instruction Fuzzy Hash: 6831C772A083105BEB2D661DA4B033D6BD4E7C8371F6E86BFE95987390D6348C855782
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: BitsClientRectRelease
                                  • String ID: ($XGetGeometry: invalid pixmap$XGetGeometry: invalid window$XGetGeometry: unable to get bitmap size
                                  • API String ID: 3715867303-1062310972
                                  • Opcode ID: 91f3bd013758c042234772afa9cdbc58406a6aa2a7419c1803289a9ba2e9cfa6
                                  • Instruction ID: a3824e450d59175c744d0ae9e5737030e8f873dbc0bf1bd6f793a190f7c234fe
                                  • Opcode Fuzzy Hash: 91f3bd013758c042234772afa9cdbc58406a6aa2a7419c1803289a9ba2e9cfa6
                                  • Instruction Fuzzy Hash: 3931CDB56083018FD351EF28D588B1ABBF4BF98700F56896DF8898B254E774D844CB92
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: FileModuleNamestrrchr$sprintf
                                  • String ID: 8.5$\$lib/tcl%s
                                  • API String ID: 2524988984-1034088147
                                  • Opcode ID: c0862f16aa6b7b14163d2a8cbcdc130c59de753c3d975f31f07fa3b32ae985c8
                                  • Instruction ID: 7d1b10fe1b441850de264a6b23ca1c7ff29602d025be7784dd70299a569468bf
                                  • Opcode Fuzzy Hash: c0862f16aa6b7b14163d2a8cbcdc130c59de753c3d975f31f07fa3b32ae985c8
                                  • Instruction Fuzzy Hash: 903158B50087528FD710AF25C84536EBBE0BF85741F15882EE8D897381DB78994ACB96
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: _Jv_RegisterClasses$__register_frame_info$libgcc_s_dw2-1.dll$libgcj-13.dll
                                  • API String ID: 1646373207-159345992
                                  • Opcode ID: 69ff601f59e836d4174a2d09f929219702eea17b5cf99079dbb6256c7e562847
                                  • Instruction ID: 555aaf3543f1cb8e93a6868e6b4c2592fb9b2b20382015dd9fecbe8c439018af
                                  • Opcode Fuzzy Hash: 69ff601f59e836d4174a2d09f929219702eea17b5cf99079dbb6256c7e562847
                                  • Instruction Fuzzy Hash: 99F081B460830186DB017FB9992962EBEE8BF80706F19881DD8C697A55DBB4D40CD763
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (%s "%.50s" in widget "%.50s")$ (processing "%.40s" option)$" missing$NULL main window$database entry for$default value for$value for "
                                  • API String ID: 0-3198808278
                                  • Opcode ID: 9bcc0d62045106e1f6b9c6ff87ac1079fde641aeea24d5236b0d8961fc5a3b26
                                  • Instruction ID: 3841d862ab9734454d839dcde98ed7d8ec9006e76e5cf0a89c202f2762a7fbb8
                                  • Opcode Fuzzy Hash: 9bcc0d62045106e1f6b9c6ff87ac1079fde641aeea24d5236b0d8961fc5a3b26
                                  • Instruction Fuzzy Hash: 4FA1DE756193408BD325DF29D584BAABBE0BF88750F55992DE88CCB315E730EC85CB82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _strnicmp
                                  • String ID: for $ images$" is not supported$-file option isn't supported$-file option isn't supported for $couldn't recognize data in image file "$image file format "
                                  • API String ID: 2635805826-3567883053
                                  • Opcode ID: ae5f5ecae53370c5064a0f10944a108e90c9f4fb1fe46988141c51bd3ab59eeb
                                  • Instruction ID: 78d996e0fbf9b611dc9f1bc2cd0b791b8d3a946ba96f91f99ae8ac1d131719f5
                                  • Opcode Fuzzy Hash: ae5f5ecae53370c5064a0f10944a108e90c9f4fb1fe46988141c51bd3ab59eeb
                                  • Instruction Fuzzy Hash: 52A1DDB4619300DFD701CF29C48872ABBE4BB89754F15E92EF8998B365D7B4E8448F42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _strnicmp
                                  • String ID: " is $?options?$coordinates for -from option extend $image string format "$not supported$outside image$unknown
                                  • API String ID: 2635805826-3913111783
                                  • Opcode ID: bf81b5beeede022a5bba4eebebf5d9375eb8f9c2a2b79dbefbc54582b1a26752
                                  • Instruction ID: d28555078e9dfee448789ce60e1aa601d1f33e78b8cfcd1537fec6d39f3ce804
                                  • Opcode Fuzzy Hash: bf81b5beeede022a5bba4eebebf5d9375eb8f9c2a2b79dbefbc54582b1a26752
                                  • Instruction Fuzzy Hash: 0A910375608741CFD325DF29C484BAABBE0BF88710F11896EE8998B361DB74D844CF42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _strnicmp
                                  • String ID: for $ images$" is not supported$-data option isn't supported$-data option isn't supported for $couldn't recognize image data$image format "
                                  • API String ID: 2635805826-4191631852
                                  • Opcode ID: b6b8632302165ee0f8131a3cd9bd52cc825a617db99dcc03e6c0b0a520e63239
                                  • Instruction ID: 8eaee94539516921d8cdf4f34b1acd74f1bc5a284f1bcbe6ae57c1bcfa5c906a
                                  • Opcode Fuzzy Hash: b6b8632302165ee0f8131a3cd9bd52cc825a617db99dcc03e6c0b0a520e63239
                                  • Instruction Fuzzy Hash: 1C7114706187418FD711DF6AC48862BBBE4BF88754F15CA2EE8D88B359D7B4D8448F42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSend$LongWindow$Parent
                                  • String ID:
                                  • API String ID: 1638718586-0
                                  • Opcode ID: 6bcd81c41302c9e374713c3b22592ac73ce76d172d91d968dffe434b95b1494f
                                  • Instruction ID: 4f747dc392b8c84832c5feb127b028e8b9c7a8170e6d563f5a5fb940e48e2800
                                  • Opcode Fuzzy Hash: 6bcd81c41302c9e374713c3b22592ac73ce76d172d91d968dffe434b95b1494f
                                  • Instruction Fuzzy Hash: 716127B05083018FD315AF28C488B2AFBF5AF95310F158A5DE9858B391DB75DD858B92
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSend$LongWindow$Parent
                                  • String ID:
                                  • API String ID: 1638718586-0
                                  • Opcode ID: 0427de9caa8102f4e9db9ea0b6f5493c4eaa98700003fae230a8a43b72ef22b7
                                  • Instruction ID: ee09b15bff45fbabf7305945c91174c221ca77ddd6679099954448794ea93ba1
                                  • Opcode Fuzzy Hash: 0427de9caa8102f4e9db9ea0b6f5493c4eaa98700003fae230a8a43b72ef22b7
                                  • Instruction Fuzzy Hash: ED6138B45083029BC314EF29C489B2AFBF4FF85340F118A1EE9958B361E7759D85DB82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: -blocking$-buffering$command mode$none$read$rechan%d$seek$write
                                  • API String ID: 590974362-3221071033
                                  • Opcode ID: 99fd084a599a1699a2f74a0ddd1a966f375695b8fd5f9f5cfd982bb828fc8ab5
                                  • Instruction ID: 59229719a5edfe1e1df7f994f8be1668d5d2da44e08b6e8ef01e5ccb3eacdf34
                                  • Opcode Fuzzy Hash: 99fd084a599a1699a2f74a0ddd1a966f375695b8fd5f9f5cfd982bb828fc8ab5
                                  • Instruction Fuzzy Hash: 2E51BFB45097019FD310EF2AC48422AFBE0FF88365F15891EE4D99B361D779A489CF86
                                  APIs
                                  Strings
                                  • bad screen number "%d", xrefs: 00364ED3
                                  • no display name and no $DISPLAY environment variable, xrefs: 00364F5B
                                  • couldn't connect to display ", xrefs: 00364F32
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strncmpstrncpy
                                  • String ID: bad screen number "%d"$couldn't connect to display "$no display name and no $DISPLAY environment variable
                                  • API String ID: 2502451431-243112062
                                  • Opcode ID: 70896b5d40fea98e3d8b3ad01149f61bbd86dafcf01b002298fdf35a0ebc9c6f
                                  • Instruction ID: 85f2843faee28fbcc7e03e11d1d2495ba52e8c1d395a46bccfd9fadf987d1921
                                  • Opcode Fuzzy Hash: 70896b5d40fea98e3d8b3ad01149f61bbd86dafcf01b002298fdf35a0ebc9c6f
                                  • Instruction Fuzzy Hash: D5A1F1B0A09341DFD751EF28C488B6ABBE4BF88304F11C96EE8988B356D775D844CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmpstrpbrk
                                  • String ID: *[?\$LOOKUP$NAMESPACE$TCL$unknown namespace in namespace forget pattern "
                                  • API String ID: 2613077465-3194879715
                                  • Opcode ID: 878081a90040e5b778b677396535f75cf3d529965f994b83f413978acf9f5417
                                  • Instruction ID: 1e849ffabf8313eb6d79febc8bb6e6bf62d98650cca3029d10d2695a8a81274b
                                  • Opcode Fuzzy Hash: 878081a90040e5b778b677396535f75cf3d529965f994b83f413978acf9f5417
                                  • Instruction Fuzzy Hash: 4D71ACB45087448FD720BF26C18466FBBE4BF84744F118C6EE89997302D778D845DBAA
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _isctype$sscanf
                                  • String ID: $%d %d %d$P5 $P6
                                  • API String ID: 1823185915-2664775524
                                  • Opcode ID: 7a7cd361c1a541637a4b1aa68381e699d0245cd3300bca03543d4daeb2c55de3
                                  • Instruction ID: 8b9735bceff765fb62bdf8b2cfe2cdbee0e294a4e422dac68d0e5b285f704d84
                                  • Opcode Fuzzy Hash: 7a7cd361c1a541637a4b1aa68381e699d0245cd3300bca03543d4daeb2c55de3
                                  • Instruction Fuzzy Hash: D9517974509B81DFD7299F18C48422ABBE4FB85705F95982EF5C88B391D3B9D884CB42
                                  APIs
                                  Strings
                                  • file info ptr not on thread channel list, xrefs: 00474CB5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Event$ObjectSingleWait$MessageSend
                                  • String ID: file info ptr not on thread channel list
                                  • API String ID: 1288402012-2851361322
                                  • Opcode ID: c8f1e9e5debff94762c24261898d70868edc6eadb9290c6822769afded03f47e
                                  • Instruction ID: 240f7fd2036f0375e7c550d670dd2b80d2d6d36cf918827178c355ab06d8cbe2
                                  • Opcode Fuzzy Hash: c8f1e9e5debff94762c24261898d70868edc6eadb9290c6822769afded03f47e
                                  • Instruction Fuzzy Hash: D73144B06097018FC720BF39C58556ABBE4BF88704F128E6EE4D99B341E738D8448B67
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Version
                                  • String ID: Control Panel\Appearance$Current$Windows Standard
                                  • API String ID: 1889659487-3605654883
                                  • Opcode ID: d04c7997c474b19b73efd36b692b31a427692063b25f695ffb9f4de3dc90c92e
                                  • Instruction ID: 8975cd7f70d8579d971d2d1465d1538e3c94a6ecc0e297ea623f54b294849800
                                  • Opcode Fuzzy Hash: d04c7997c474b19b73efd36b692b31a427692063b25f695ffb9f4de3dc90c92e
                                  • Instruction Fuzzy Hash: 382123B09093419BEB50DF68D989B1FBBE4BB84305F858D2DF4848B260D778C5498B42
                                  APIs
                                    • Part of subcall function 0044EFA8: EnterCriticalSection.KERNEL32(?,?,00000000,?,0046CEA7,?,?,?,?,00000000,?,0046D2F4), ref: 0044EFBA
                                  • InitializeCriticalSection.KERNEL32 ref: 0046C782
                                  • GetCurrentThreadId.KERNEL32 ref: 0046C78F
                                  • CreateEventA.KERNEL32 ref: 0046C7B6
                                  • RegisterClassA.USER32 ref: 0046C820
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CriticalSection$ClassCreateCurrentEnterEventInitializeRegisterThread
                                  • String ID: 0$TclNotifier$Unable to register TclNotifier window class
                                  • API String ID: 2494884448-2475704536
                                  • Opcode ID: a6289dba260f1f271cdc21a89f2cc50dd3acbb0f367c952c9788be915c691eef
                                  • Instruction ID: a0e4319f047e7d4e0c09ab3c73fce13360eecd4eac42d1548ff137617b52d5ab
                                  • Opcode Fuzzy Hash: a6289dba260f1f271cdc21a89f2cc50dd3acbb0f367c952c9788be915c691eef
                                  • Instruction Fuzzy Hash: F221EFB04083419FE740EF65C49931EBFE0BB84348F50995DE8C89B242D7B98589DF9B
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: " has bad maximum intensity value $" has dimension(s) <= 0$": $PPM image file "$couldn't read raw PPM header from file "$error reading PPM image file "$not enough data
                                  • API String ID: 590974362-1107762841
                                  • Opcode ID: 6372ad6f0b5ba15425a0f31f40c367823daaf8400ba39362075c2f48f10eeb3b
                                  • Instruction ID: c8705bea9d0626bfbec2230cf3a92890a16bf12e1b96322e5437234c73df2b76
                                  • Opcode Fuzzy Hash: 6372ad6f0b5ba15425a0f31f40c367823daaf8400ba39362075c2f48f10eeb3b
                                  • Instruction Fuzzy Hash: C9C1DF74608741DFD365DF29C4C8B5ABBE0BF88314F11892EE9DC8B361D7B5A8488B52
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: %.15g %.15g %.15g %.15g %.15g %.15g curveto$%.15g %.15g lineto$%.15g %.15g moveto
                                  • API String ID: 590974362-459612671
                                  • Opcode ID: fef426e6f3f93547a2978f16b412e2ab4c51eb1cce1687ff4cdd8111567c85b5
                                  • Instruction ID: 0f37a245f1edd47cdff61f472c62fc21c92a6c352df4dd639392841a0ccd3e39
                                  • Opcode Fuzzy Hash: fef426e6f3f93547a2978f16b412e2ab4c51eb1cce1687ff4cdd8111567c85b5
                                  • Instruction Fuzzy Hash: E1A119B1408B85DBD7216F55E4883AEBFF0FBC9340F528C89E5C852295DB3588B9CB46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #%d$Either a "-name" $or a "-image" argument must be provided $to the "image create" subcommand.
                                  • API String ID: 0-4153807706
                                  • Opcode ID: 6a48a5c53d1c9012eb92f3f3484032822193fa1a98b3c064f5f0c1cc64d8ac17
                                  • Instruction ID: 3f2986943eb219929972acb4bb1d962b097dd95af062e1a72926fc27de1a31b7
                                  • Opcode Fuzzy Hash: 6a48a5c53d1c9012eb92f3f3484032822193fa1a98b3c064f5f0c1cc64d8ac17
                                  • Instruction Fuzzy Hash: 0A91E270208751DFC354DF29E488A6ABBE4FF88310F518A6EF8998B361D774E845CB42
                                  Strings
                                  • (default value for "%.50s"), xrefs: 003E168F
                                  • (database entry for "%.50s"), xrefs: 003E15C2
                                  • (system default for "%.50s"), xrefs: 003E16AC
                                  • in widget "%.50s"), xrefs: 003E15EE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (database entry for "%.50s")$ (default value for "%.50s")$ (system default for "%.50s")$ in widget "%.50s")
                                  • API String ID: 0-3381673809
                                  • Opcode ID: 6fa44ebc62790b2fb983e1d923f6f4254d24f5ba15a13a81a7acf2df7cb63fd1
                                  • Instruction ID: f75f2a5d5f96b1e619d18cb808fc8336cbbccfc49a43f5518f2c26dd3df0b48e
                                  • Opcode Fuzzy Hash: 6fa44ebc62790b2fb983e1d923f6f4254d24f5ba15a13a81a7acf2df7cb63fd1
                                  • Instruction Fuzzy Hash: 5A613C71608795CFC721DF2AC58469ABBE4FF85350F158A2DE8998B391E770D844CF42
                                  APIs
                                  • InterlockedIncrement.KERNEL32 ref: 0053985A
                                  • abort.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,005369FE), ref: 00539936
                                  • InterlockedDecrement.KERNEL32 ref: 0053998C
                                  • ReleaseSemaphore.KERNEL32 ref: 005399B2
                                  • InterlockedIncrement.KERNEL32 ref: 005399C7
                                  • WaitForSingleObject.KERNEL32 ref: 00539A3D
                                  • InterlockedDecrement.KERNEL32 ref: 00539A54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Interlocked$DecrementIncrement$ObjectReleaseSemaphoreSingleWaitabort
                                  • String ID:
                                  • API String ID: 294969301-0
                                  • Opcode ID: 62536229903dcb9c8172f4717a3481f0266c4750722844886dd96e2ce757ede5
                                  • Instruction ID: edfc7f7dfce3959c6f986084f2cdf59df18a654f28855065eded100ba4cba617
                                  • Opcode Fuzzy Hash: 62536229903dcb9c8172f4717a3481f0266c4750722844886dd96e2ce757ede5
                                  • Instruction Fuzzy Hash: 2051B4F560434A8BCB24EF65D48176ABFE9BB91700F10491DEC888B341D7B0DC09DB92
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf$atoistrncpy
                                  • String ID: *** unknown regex error code 0x%x ***$REG_%u
                                  • API String ID: 248301967-954403335
                                  • Opcode ID: 2ede6d30ea60420fcf1643c3999dbb1a3382e96ab71d454d7e815ffd3da6e1b9
                                  • Instruction ID: 9f1c48ee44117cb03ea7f79c6bdc35ee8b7a88feec0cba6ee75f19a0912b11b5
                                  • Opcode Fuzzy Hash: 2ede6d30ea60420fcf1643c3999dbb1a3382e96ab71d454d7e815ffd3da6e1b9
                                  • Instruction Fuzzy Hash: EC31DF756483418BCB14DF26C4C451FBBE1BBD2392F29C82EE84987321D634E8499B57
                                  APIs
                                  • sprintf.MSVCRT ref: 0040C62B
                                    • Part of subcall function 003D981C: sprintf.MSVCRT ref: 003D98AD
                                    • Part of subcall function 003D981C: sprintf.MSVCRT ref: 003D9931
                                    • Part of subcall function 003D981C: sprintf.MSVCRT ref: 003D996D
                                  • sprintf.MSVCRT ref: 0040C887
                                  Strings
                                  • matrix currentmatrix%.15g %.15g translate %.15g %.15g scale 1 0 moveto 0 0 1 0 360 arcsetmatrix, xrefs: 0040C61C
                                  • fill, xrefs: 0040C790
                                  • clip , xrefs: 0040C6CD
                                  • grestore gsave, xrefs: 0040C721
                                  • 0 setlinejoin 2 setlinecap, xrefs: 0040C748
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: 0 setlinejoin 2 setlinecap$clip $fill$grestore gsave$matrix currentmatrix%.15g %.15g translate %.15g %.15g scale 1 0 moveto 0 0 1 0 360 arcsetmatrix
                                  • API String ID: 590974362-3824069345
                                  • Opcode ID: f14bd03203c75fb4c4092803f4901acd51aef2bb8cf3234520f14aea9f7df4ad
                                  • Instruction ID: 757a1db9de5c9d64b5fd7cc67c99fe24f2d59d518c9d87eebed339662881f81f
                                  • Opcode Fuzzy Hash: f14bd03203c75fb4c4092803f4901acd51aef2bb8cf3234520f14aea9f7df4ad
                                  • Instruction Fuzzy Hash: B9817E75608701DBC720AF14D48469ABBF4FFC8340F218A2EE8CC973A5E7368855DB86
                                  Strings
                                  • grab failed: keyboard or pointer frozen, xrefs: 0038D5F1
                                  • grab failed: window not viewable, xrefs: 0038D49C
                                  • L , xrefs: 0038D40C
                                  • grab failed: invalid time, xrefs: 0038D5DC
                                  • grab failed: another application has grab, xrefs: 0038D359
                                  • grab failed for unknown reason (code %d), xrefs: 0038D593
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: L $grab failed for unknown reason (code %d)$grab failed: another application has grab$grab failed: invalid time$grab failed: keyboard or pointer frozen$grab failed: window not viewable
                                  • API String ID: 0-4177450947
                                  • Opcode ID: 31ede94c0bf77a5917e03222de3f1907df2193b3adcad8a05342222709f0d8b1
                                  • Instruction ID: db893926b8f2bd39148f2d74a38cd89ead7ab435470a2e1f7f46182efba419ed
                                  • Opcode Fuzzy Hash: 31ede94c0bf77a5917e03222de3f1907df2193b3adcad8a05342222709f0d8b1
                                  • Instruction Fuzzy Hash: 2A81E4B4208341DFD712EF24C08475EBBE4BF89344F21896EE4898B295D7B5D988CF82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: ": $-encoding$-translation$P6%d %d255$binary$error writing "
                                  • API String ID: 590974362-3637212168
                                  • Opcode ID: 161a7437252f77eaa93043676a1d01f5672b4f8b7c00813b711ab639a0d4bd8c
                                  • Instruction ID: 22938914b77dd7eb73db90f4bd514ce90c4e55311771216e8fda4d306aef49a5
                                  • Opcode Fuzzy Hash: 161a7437252f77eaa93043676a1d01f5672b4f8b7c00813b711ab639a0d4bd8c
                                  • Instruction Fuzzy Hash: 0381C0B4208341DFC321DF29D584A5ABBE4FF88355F11CA6EE89C8B325D334A844CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strpbrk
                                  • String ID: $$*[?\$stderr$stdin$stdout
                                  • API String ID: 3024680390-3541927064
                                  • Opcode ID: d91288cd714479ce7fb8defd868c49e9d5a6b24dd06c373582f0ca4c94d03403
                                  • Instruction ID: c3b8557161c539e35a97e73745b0d47822ff60d305256ded22cb7ce4d7541940
                                  • Opcode Fuzzy Hash: d91288cd714479ce7fb8defd868c49e9d5a6b24dd06c373582f0ca4c94d03403
                                  • Instruction Fuzzy Hash: CA514BB16087029FD710AF25D48062EFBE4FF98714F15991FE89887341D3B8DC469B5A
                                  APIs
                                  Strings
                                  • releasing focus to root after %s died, xrefs: 003851E8
                                  • focus cleared after %s died, xrefs: 003851D0
                                  • forwarding focus to %s after %s died, xrefs: 0038520C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: printf
                                  • String ID: focus cleared after %s died$forwarding focus to %s after %s died$releasing focus to root after %s died
                                  • API String ID: 3524737521-3504952018
                                  • Opcode ID: 84c633042d2944ec476bbf2bc067ef50e1ec3fd4e8d1f857ed13bd3f34e0ada5
                                  • Instruction ID: 60ad544076fb05828e82edc72987ecbadb62f852a15463086366206f98b5ba10
                                  • Opcode Fuzzy Hash: 84c633042d2944ec476bbf2bc067ef50e1ec3fd4e8d1f857ed13bd3f34e0ada5
                                  • Instruction Fuzzy Hash: CE5114B0605B05DFCB16EF24C58876ABBE1BF84714F2581AEE8498B305D331EC84DB82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: wsprintf$_getpid
                                  • String ID: %lu$*YX$?channelId?
                                  • API String ID: 747562004-1062779557
                                  • Opcode ID: ef400cf3e872114779b45a90eccc47181349dd4197dcaa416f195520a49f8d0f
                                  • Instruction ID: 53c4f51fb8cb24fbdd127884836009cd34d93ccaafa6a24cbb35abcfe4bbd732
                                  • Opcode Fuzzy Hash: ef400cf3e872114779b45a90eccc47181349dd4197dcaa416f195520a49f8d0f
                                  • Instruction Fuzzy Hash: 354124B1A087019FD710AF79D48925EFBE0EB84364F118C2EE4C887351EB79D885CB46
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Event_errno$ErrorFileLastObjectResetSingleWaitWrite
                                  • String ID:
                                  • API String ID: 2981044469-0
                                  • Opcode ID: f002b47936a2276d5ec3b663640e59c3e9f44d43d3a4f0a94b89886a4ac7cb42
                                  • Instruction ID: f72a64e18b517876f1e49ae733569d6f2ce0563afeb89a0ca108e0ead615ef3f
                                  • Opcode Fuzzy Hash: f002b47936a2276d5ec3b663640e59c3e9f44d43d3a4f0a94b89886a4ac7cb42
                                  • Instruction Fuzzy Hash: AE3108705087058FCB50EF79C18965ABBE4BF88344F00895EEC998B346E778E840CB56
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: :$:$\$\$\$error getting working directory name:
                                  • API String ID: 1452528299-3264800105
                                  • Opcode ID: 82e4f619ec196724365e1ff34f04fc25f291fd204facdacd17887ac69419f743
                                  • Instruction ID: 9e86fc77c721ebe8f168462da9400dfab2282d994a15ca18bf7dca12a1638166
                                  • Opcode Fuzzy Hash: 82e4f619ec196724365e1ff34f04fc25f291fd204facdacd17887ac69419f743
                                  • Instruction Fuzzy Hash: 4C316C709083819EEB20EF64D8A867BBBE0AB85354F24485FE4C447351C7789989CB9B
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Event$NamedObjectPeekPipeResetSingleWait_errno
                                  • String ID:
                                  • API String ID: 457578815-0
                                  • Opcode ID: 47e2c1b5520dae5186aa579e8dd62cc0d01b21d3d1611044e433c9f3bab963c2
                                  • Instruction ID: 677d496c0e4de183f12afa23cebe946a4106ddfb0baf89914026783165cf6752
                                  • Opcode Fuzzy Hash: 47e2c1b5520dae5186aa579e8dd62cc0d01b21d3d1611044e433c9f3bab963c2
                                  • Instruction Fuzzy Hash: 3D2186F15047418FDB44AF79D48975A7BE4BF80328F00895AE99C8B351D3B9C845CB93
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Event$ConsoleInputObjectPeekResetSingleWait_errno
                                  • String ID:
                                  • API String ID: 245933807-0
                                  • Opcode ID: d7bb823f4c3a65307c5141eb5fbfefe038340d6a93313ce2913f0c82b5d87c9c
                                  • Instruction ID: 2e77ef0f7ed6d3d11e8eece8d8df723b3ff51c017f98c5dbb840127f87b3d432
                                  • Opcode Fuzzy Hash: d7bb823f4c3a65307c5141eb5fbfefe038340d6a93313ce2913f0c82b5d87c9c
                                  • Instruction Fuzzy Hash: 27216DB19043058FCB00AF7CD48565ABBE4BB80365F044A6BEC98CB352E339D5458B53
                                  APIs
                                  • SendMessageA.USER32 ref: 004750C4
                                  • sprintf.MSVCRT ref: 004750E2
                                    • Part of subcall function 00436D94: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,0046F864), ref: 00436E0A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSendsprintfstrcpy
                                  • String ID: -translation$FWX$auto crlf$sock%u
                                  • API String ID: 1514644457-2564042312
                                  • Opcode ID: d02e1f50bcc7d9dff11831a0e5b0e33c5b6d9a79aab058df88aa8cc626e5600d
                                  • Instruction ID: 97a15d8cd85dde8c2655e1e1660b26cdf5460cc6541be70b474bee7d1c70eacc
                                  • Opcode Fuzzy Hash: d02e1f50bcc7d9dff11831a0e5b0e33c5b6d9a79aab058df88aa8cc626e5600d
                                  • Instruction Fuzzy Hash: F71196B05083019FD740AF69D58579ABFE0BF48358F41C81DE4C88B346E3B99985CB97
                                  APIs
                                  • DeleteCriticalSection.KERNEL32 ref: 0046C853
                                  • CloseHandle.KERNEL32(00000000), ref: 0046C85F
                                  • KillTimer.USER32(00000000), ref: 0046C877
                                  • DestroyWindow.USER32 ref: 0046C885
                                  • UnregisterClassA.USER32(00000000,00000000), ref: 0046C8C0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ClassCloseCriticalDeleteDestroyHandleKillSectionTimerUnregisterWindow
                                  • String ID: TclNotifier
                                  • API String ID: 2467336756-2580919091
                                  • Opcode ID: d91dfccac271a0f7541a41b5ce10c39d96a575a0f37e3274dedd94128267afcb
                                  • Instruction ID: a250fd7b6a5dff26398d6816933010d8c01e5369194e44d65d4b903b9c6105eb
                                  • Opcode Fuzzy Hash: d91dfccac271a0f7541a41b5ce10c39d96a575a0f37e3274dedd94128267afcb
                                  • Instruction Fuzzy Hash: 36014BB19043419BC700BFB989CA52E7FE4BF54305F41895EF9C89B202E739C4499B67
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmp
                                  • String ID: (processing -height option)$ (processing -width option)$a
                                  • API String ID: 1004003707-2829466702
                                  • Opcode ID: 5593ee75ba5c461fa73e5d23c3db2dc8f7e44cc253ad4592ed666774bf157119
                                  • Instruction ID: 4b9b645fa8f8da6b6d574412f02f8ec5f95dbf0533f02974e915f6803068532e
                                  • Opcode Fuzzy Hash: 5593ee75ba5c461fa73e5d23c3db2dc8f7e44cc253ad4592ed666774bf157119
                                  • Instruction Fuzzy Hash: 1C22F174608B42DFD745DF29C48866ABBE4FF89345F11892DE8998B351EB70E844CF82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -menu$bindtags$menu type$normal$tk::MenuDup
                                  • API String ID: 0-3061652890
                                  • Opcode ID: ade98d9f2046e1928b4dcb4d7cd3048ecf3321d665162fef8941b7f5c0f89295
                                  • Instruction ID: 9e8dcd9448beebd829187b043d70c786b02bd8081117e6e0933b6e518b8e5052
                                  • Opcode Fuzzy Hash: ade98d9f2046e1928b4dcb4d7cd3048ecf3321d665162fef8941b7f5c0f89295
                                  • Instruction Fuzzy Hash: F602ADB4608741CFD744DF29D484A2ABBF4BF99311F118A6EE899CB361DB30E844CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: $%d/%d/%d$ImgPhotoGet couldn't find visual for window$black$white
                                  • API String ID: 590974362-3120746423
                                  • Opcode ID: b89d66eb719f38d9086f7b3c7c086c1f8361cad42925c046643bf118ebef4161
                                  • Instruction ID: cc19a26792c39c29b41fbbf458146dfd5287ca50dc2620e7af520c028c2edb06
                                  • Opcode Fuzzy Hash: b89d66eb719f38d9086f7b3c7c086c1f8361cad42925c046643bf118ebef4161
                                  • Instruction Fuzzy Hash: ECC10475A08300CFD715DF24C084B5ABBE1BB88304F16CA6DE8998B35AD775E985CF82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: TraceExecutionProc: bad flag combination$enter$enterstep$leave$leavestep
                                  • API String ID: 0-3904349477
                                  • Opcode ID: 61e41e78c395bc4ef65b0ffa4c4f6425fb5bdf89ce303605c1c0b9cf85e9d63e
                                  • Instruction ID: 6a529eb94287b217316e09bba6f6d8fd03cdd6c625488712ab9a85026cf1c3ae
                                  • Opcode Fuzzy Hash: 61e41e78c395bc4ef65b0ffa4c4f6425fb5bdf89ce303605c1c0b9cf85e9d63e
                                  • Instruction Fuzzy Hash: AEB117B45087459BD764EF25C4856AFBBE0BF84345F04892EF8888B301D738D945DFAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (in $ validation command executed by $%$%
                                  • API String ID: 0-3903685564
                                  • Opcode ID: ec87e4fd8ee6c66aa5c878820de95aeec5d6e63b7749ef666566d08a454bab64
                                  • Instruction ID: 12f78a3fecdcd713d0a42ecabad91b76a4c73bc5fe20aaae8b7b3dec048d5b5e
                                  • Opcode Fuzzy Hash: ec87e4fd8ee6c66aa5c878820de95aeec5d6e63b7749ef666566d08a454bab64
                                  • Instruction Fuzzy Hash: FBC10974608745CFC314DF28D8886AABBE4FF89315F158A6EE9A8873A1D730D944DF42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _stricmp$Release
                                  • String ID:
                                  • API String ID: 2376057513-0
                                  • Opcode ID: a1e5b16c6a5bb209f1bc88c72b076d0e8fb0160549210ff12f3b2fd40a271cce
                                  • Instruction ID: 67510435ce59af838bee093e4bdfe4ffeb4aa63e9d279b9fff6071a728d44217
                                  • Opcode Fuzzy Hash: a1e5b16c6a5bb209f1bc88c72b076d0e8fb0160549210ff12f3b2fd40a271cce
                                  • Instruction Fuzzy Hash: 9D9137766283028FDB11DF29E48062ABBF4FFC8314F15992EE8998B311D734E945CB42
                                  APIs
                                  Strings
                                  • bad file type ", xrefs: 0042D30A
                                  • should be "typeName {extension ?extensions ...?} , xrefs: 0042D2F6
                                  • ?{macType ?macTypes ...?}?", xrefs: 0042D2EE
                                  • ", , xrefs: 0042D2FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcpy
                                  • String ID: ", $?{macType ?macTypes ...?}?"$bad file type "$should be "typeName {extension ?extensions ...?}
                                  • API String ID: 3177657795-1261369259
                                  • Opcode ID: ba2652f16d10da24afee807389e6e50323e492bb421465bd30ff3b879b332f95
                                  • Instruction ID: 1218c3b1bd409e28907e5aa74a13d9f4177444a0c938e6481840f3b1843edfef
                                  • Opcode Fuzzy Hash: ba2652f16d10da24afee807389e6e50323e492bb421465bd30ff3b879b332f95
                                  • Instruction Fuzzy Hash: CB61EDB4A08310DFC350DF29E584A1ABBE0FF88314F91892EF8998B320D374E845CB46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: %d %d moveto$%d %d scale$0 0 moveto 1 0 rlineto 0 1 rlineto -1 0 rlineto $closepath fill
                                  • API String ID: 590974362-3731578654
                                  • Opcode ID: d88e0d297ea27a1eabe8b6906e1b1fea7ccaeac925e77ed75c52c3eb84d2498c
                                  • Instruction ID: e1b56d7f3a24f3043ad0ab0546e61c30e79aa0e91a0e6adbd2f343b8dc402775
                                  • Opcode Fuzzy Hash: d88e0d297ea27a1eabe8b6906e1b1fea7ccaeac925e77ed75c52c3eb84d2498c
                                  • Instruction Fuzzy Hash: E361D4B46083418FD725DF28C485A9ABBE4BF88740F55CA2DE9C88B319D770D881CB92
                                  APIs
                                  Strings
                                  • " already exists, xrefs: 00444614
                                  • cannot expose to a namespace (use expose to toplevel, then rename), xrefs: 004444F3
                                  • exposed command ", xrefs: 00444624
                                  • unknown hidden command ", xrefs: 0044457C
                                  • trying to expose a non global command name space command, xrefs: 0044453C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strstr
                                  • String ID: " already exists$cannot expose to a namespace (use expose to toplevel, then rename)$exposed command "$trying to expose a non global command name space command$unknown hidden command "
                                  • API String ID: 1392478783-3605621997
                                  • Opcode ID: 78fe1229585e050b330c853ec290857eaef3bb7cf74151ac5042b9f94814e147
                                  • Instruction ID: def4179a45df98ce655f818f280849b68a879374f918d1d273e4a315e00f4e68
                                  • Opcode Fuzzy Hash: 78fe1229585e050b330c853ec290857eaef3bb7cf74151ac5042b9f94814e147
                                  • Instruction Fuzzy Hash: A44102B46087019BEB009F29D084B5BFBE0BFC4354F55C92EE8998B305D378D8849B86
                                  APIs
                                  Strings
                                  • >} imagemask , xrefs: 00368640
                                  • unable to generate postscript for bitmaps larger than 60000 pixels, xrefs: 00368682
                                  • %02x, xrefs: 003685DB
                                  • 0 0 moveto %d %d true [%d 0 0 %d 0 %d] {<, xrefs: 00368552
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: %02x$0 0 moveto %d %d true [%d 0 0 %d 0 %d] {<$>} imagemask $unable to generate postscript for bitmaps larger than 60000 pixels
                                  • API String ID: 590974362-2982387933
                                  • Opcode ID: 4f6f2cbcf1c0f8f9ca9316ca378630af662f490dcf4931b5c1189a58b8c04ef5
                                  • Instruction ID: b0d98335e6516675ed40944db98f8431d7251c634423abb8de4facb0d5dc358d
                                  • Opcode Fuzzy Hash: 4f6f2cbcf1c0f8f9ca9316ca378630af662f490dcf4931b5c1189a58b8c04ef5
                                  • Instruction Fuzzy Hash: D0411471508305CFC305DF19D88866AFBE4FF88349F158A6EE4C99B261D7749948CF82
                                  APIs
                                    • Part of subcall function 0044EFA8: EnterCriticalSection.KERNEL32(?,?,00000000,?,0046CEA7,?,?,?,?,00000000,?,0046D2F4), ref: 0044EFBA
                                  • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,004DC975), ref: 004DC8A0
                                  • HeapAlloc.KERNEL32 ref: 004DC8B8
                                  Strings
                                  • could not allocate thread specific hash table, TclpSysAlloc failed from ThreadStorageGetHashTable!, xrefs: 004DC919
                                  • Tcl_CreateHashEntry failed from ThreadStorageGetHashTable!, xrefs: 004DC903
                                  • 8, xrefs: 004DC8A5
                                  • 8., xrefs: 004DC855, 004DC88B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Heap$AllocCriticalEnterProcessSection
                                  • String ID: 8$8.$Tcl_CreateHashEntry failed from ThreadStorageGetHashTable!$could not allocate thread specific hash table, TclpSysAlloc failed from ThreadStorageGetHashTable!
                                  • API String ID: 1913725810-1742920735
                                  • Opcode ID: 246d77be9da811c483e70b1904e81509fa634044d2fde1451addab76e9d83eec
                                  • Instruction ID: c9b10fe9fe4ffd8c76edcdbc9df13b6e3eaa223acc4d56e191f77d3b27e12779
                                  • Opcode Fuzzy Hash: 246d77be9da811c483e70b1904e81509fa634044d2fde1451addab76e9d83eec
                                  • Instruction Fuzzy Hash: E0217FB05083429BC314AF6AD48462EBFE1BF80340F45892FE4D88B351D778C446EB4A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strtod
                                  • String ID: " but got "$" option requires an additional argument$argument for "$expected floating-point
                                  • API String ID: 173204081-1950693141
                                  • Opcode ID: eb884b64627fbe739565ce315b448f7e7955f0943870dae32ef910dc04d45fea
                                  • Instruction ID: 0394554b4cfce285da0972c9812a46f9964b944f7c47a15cd2518131f2686bcb
                                  • Opcode Fuzzy Hash: eb884b64627fbe739565ce315b448f7e7955f0943870dae32ef910dc04d45fea
                                  • Instruction Fuzzy Hash: F941AB742083428FD721CF18C584A5AFBF1FB8A744F55896DE9958B325D332E84ACB92
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Window$CreateLong
                                  • String ID: BUTTON$STATIC
                                  • API String ID: 1475011609-3385952364
                                  • Opcode ID: d2a123d1e1b27c86ad171cbbea7564803023e843e36bae9d30979eaf121b492f
                                  • Instruction ID: 5a5a4a809a3388f0d3c742ff157164a1b5b5356a38c3c78e68c1bc73578662e6
                                  • Opcode Fuzzy Hash: d2a123d1e1b27c86ad171cbbea7564803023e843e36bae9d30979eaf121b492f
                                  • Instruction Fuzzy Hash: 9631C2B09097418FD740EF69C18574BBBF0FB88754F10892EE8C88B351D37999498F96
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AddressCountHandleModuleProcTick
                                  • String ID: GetLastInputInfo$USER32.DLL
                                  • API String ID: 1545651562-2013933955
                                  • Opcode ID: dcfdbb5cb2fa7531e7260452c961a0fa7e38b832fae6fc5d861c9c9b9eb6c128
                                  • Instruction ID: 52c4b66dff2c6194c35435185436bd3d7bb3e74d5d93996b586d62aa37dbbc97
                                  • Opcode Fuzzy Hash: dcfdbb5cb2fa7531e7260452c961a0fa7e38b832fae6fc5d861c9c9b9eb6c128
                                  • Instruction Fuzzy Hash: 1BF06DB46047028AEB05EF79D88922F7AE4BF90304F84891CE4D0CB291E774C588DBA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bad Macintosh file type "$macRoman
                                  • API String ID: 0-4070503902
                                  • Opcode ID: d9da7159bd47533c0f2a437aacb40a938fd5333042fb8c4f9a540e67c420cc25
                                  • Instruction ID: db002299d919afed5f21362658f1d7dd37af6014223b8c65d0486acf85748d76
                                  • Opcode Fuzzy Hash: d9da7159bd47533c0f2a437aacb40a938fd5333042fb8c4f9a540e67c420cc25
                                  • Instruction Fuzzy Hash: 9EE1DFB4608350CFD744CF28E488A5ABBF1BF88301F55896EE8988B321D774E845CF56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: missing variable name$no such variable$parent namespace doesn't exist
                                  • API String ID: 0-1491287199
                                  • Opcode ID: 711a8b18dae6a2411e897e91066209d5f0a3c3d3f769da29a2ce3207aeab765d
                                  • Instruction ID: 5ec44f6b98894e0703804ea2510d3e23b69b1edd848baaf34cfb792431d78dff
                                  • Opcode Fuzzy Hash: 711a8b18dae6a2411e897e91066209d5f0a3c3d3f769da29a2ce3207aeab765d
                                  • Instruction Fuzzy Hash: 72B13D70608B41CFD720CF25C49062BBBE1BF85355F64891EEC998B362E738D849CB46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: atoi
                                  • String ID: gfff$iso8859-1
                                  • API String ID: 657269090-3827763402
                                  • Opcode ID: 999ea8c4647cd50ca0bb129139d3916bf23f009dbf41a2e2ee2d0408ec66de45
                                  • Instruction ID: 02e96a7dfe3c812f71fdf7bac3478984d3a22e0902cbbc4c5c4d7a1e99c4b9eb
                                  • Opcode Fuzzy Hash: 999ea8c4647cd50ca0bb129139d3916bf23f009dbf41a2e2ee2d0408ec66de45
                                  • Instruction Fuzzy Hash: 1AA193746087828FDB25DF29D0847AABBF1AF89300F5AC96DD4D9AB311D7349846CB42
                                  APIs
                                  Strings
                                  • couldn't read raw PPM header from string, xrefs: 0037530C
                                  • PPM image data has dimension(s) <= 0, xrefs: 003752D8
                                  • truncated PPM data, xrefs: 003752B7
                                  • PPM image data has bad maximum intensity value , xrefs: 0037533C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: PPM image data has bad maximum intensity value $PPM image data has dimension(s) <= 0$couldn't read raw PPM header from string$truncated PPM data
                                  • API String ID: 590974362-695361817
                                  • Opcode ID: 1c176e347ba292833e2126ead8328a588ef7d5ad60bc588807291a487c032623
                                  • Instruction ID: 50fa0efe5e7a84556a68708fa846568cf4c7084945d831ebf48d748aa8063bc3
                                  • Opcode Fuzzy Hash: 1c176e347ba292833e2126ead8328a588ef7d5ad60bc588807291a487c032623
                                  • Instruction Fuzzy Hash: ABB102756087408FD329CF28C18475EFBE5BF99754F11882EE8998B352D3B5A844CB83
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: frexp$ldexp
                                  • String ID:
                                  • API String ID: 691474662-0
                                  • Opcode ID: 92873a86d5a87441be7c13e54a17ff7727372bfef3f66f6e0b122d566d996f1c
                                  • Instruction ID: bcd95d49f1a148b75be7321fc1dc833b2d9dae32b7ba0a045ae75577a883c3a9
                                  • Opcode Fuzzy Hash: 92873a86d5a87441be7c13e54a17ff7727372bfef3f66f6e0b122d566d996f1c
                                  • Instruction Fuzzy Hash: 60817A71908741CBC711FF28C88465EBBE0FB88304FA14D5EE5D9A3361EB39D8558B8A
                                  APIs
                                  Strings
                                  • ": already exists, xrefs: 0048CFF8
                                  • can't create namespace ", xrefs: 0048D004
                                  • ::errorCode, xrefs: 0048CCAA
                                  • can't create namespace "": only global namespace can have empty name, xrefs: 0048CFD8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcpy
                                  • String ID: ": already exists$::errorCode$can't create namespace "$can't create namespace "": only global namespace can have empty name
                                  • API String ID: 3177657795-1460681052
                                  • Opcode ID: 9bea1fa342f8fad00c117fcf756f3b9c2688d3f7814b33f76663c79ea6744bdb
                                  • Instruction ID: f3fe64b7ffb3d8cbfb90830d392352bed404600b25eb8d6fd617b1f90efec79f
                                  • Opcode Fuzzy Hash: 9bea1fa342f8fad00c117fcf756f3b9c2688d3f7814b33f76663c79ea6744bdb
                                  • Instruction Fuzzy Hash: 71A1E3B05083499FD720EF65C58479EBBE0BF84708F00882EE9989B341D7B9D949CF96
                                  APIs
                                  Strings
                                  • unknown or ambiguous item type ", xrefs: 003AEE0E
                                  • coords ?arg arg ...?, xrefs: 003ADFF3
                                  • type coords ?arg arg ...?, xrefs: 003AD067
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strncmp
                                  • String ID: coords ?arg arg ...?$type coords ?arg arg ...?$unknown or ambiguous item type "
                                  • API String ID: 1114863663-550349595
                                  • Opcode ID: 6ddc2a7461da67cc70a2ed7e5a182bc81cf123d0a6ed341d3e958d79cdf70738
                                  • Instruction ID: 92adcdb447717285e541c95d2e5d8c93119f8f714e6bc7310249ed112328bfca
                                  • Opcode Fuzzy Hash: 6ddc2a7461da67cc70a2ed7e5a182bc81cf123d0a6ed341d3e958d79cdf70738
                                  • Instruction Fuzzy Hash: 209199B4509380DFC355DF28C488A5ABBE4FF89310F61896EE8998B361D771E845CF82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %d %d$2$Mustn't ever update line height of last artificial line$tk_textNumPixels
                                  • API String ID: 0-2321943483
                                  • Opcode ID: 0880223ba1c9099c2f65934e70c845cd6301d77073ea5f1ae0438eeea33be1cc
                                  • Instruction ID: c980a132a0cbce5b17fd7074fbd13e804c6ede30cd287d8c52f10269d3e64b77
                                  • Opcode Fuzzy Hash: 0880223ba1c9099c2f65934e70c845cd6301d77073ea5f1ae0438eeea33be1cc
                                  • Instruction Fuzzy Hash: 2281D0746097509FC320DF29E180B6BBBE0FF89354F51892EE8D98B351D778A845CB4A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$MetricsText
                                  • String ID:
                                  • API String ID: 3697559710-0
                                  • Opcode ID: ce155ee6313fcf14f2bfc2befa351e540f80fa999006ed028159a7c5db36c054
                                  • Instruction ID: e5347456679c7d8fc48f0e69a94d73440e0550e338a702fea202c9f74f4097f4
                                  • Opcode Fuzzy Hash: ce155ee6313fcf14f2bfc2befa351e540f80fa999006ed028159a7c5db36c054
                                  • Instruction Fuzzy Hash: 07719DB5A183419FC354EF29D584A5AFBF1BB88301F41892EE899C7315EB30E848CF52
                                  APIs
                                  • abort.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005385F0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: abort
                                  • String ID:
                                  • API String ID: 4206212132-0
                                  • Opcode ID: 5ad5021263869223beb353ee02e25c6e8404376cf002269b09067a010e670c66
                                  • Instruction ID: 16b44f3b9d597ae4d7aa61bdc0a0a8a3c38ae6968ad67110afb8cc7c1332b847
                                  • Opcode Fuzzy Hash: 5ad5021263869223beb353ee02e25c6e8404376cf002269b09067a010e670c66
                                  • Instruction Fuzzy Hash: A251A0746047058FDB28CE18C04567ABFE2BFE8344F588A18F8D99B315DB30E906CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %$%$forced$key
                                  • API String ID: 0-946790861
                                  • Opcode ID: 2134a40c712d58f253cf57bdef0db47254947ab86608de1baad3e41088c5299d
                                  • Instruction ID: 1a7e38a3f682ed812ab80c70842771da8d74939dc1d7ae2860c179c197e49e7b
                                  • Opcode Fuzzy Hash: 2134a40c712d58f253cf57bdef0db47254947ab86608de1baad3e41088c5299d
                                  • Instruction Fuzzy Hash: 13615B74508345DFC319DF18D8886ABBBE4FB88318F158A6DE5E9CB661E730D848DB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: cgetall$element$elements${Expected list with even number of elements, got %d %s instead}
                                  • API String ID: 590974362-2425582667
                                  • Opcode ID: a02a28359e05d77e0ea43838aa45e38fa7efa88aafcf2633c9ea9ff29d144dcf
                                  • Instruction ID: b151505417bdb9b31ed92aa6e87fbab7aaa2beb063779b62e372a1b7e7f05d74
                                  • Opcode Fuzzy Hash: a02a28359e05d77e0ea43838aa45e38fa7efa88aafcf2633c9ea9ff29d144dcf
                                  • Instruction Fuzzy Hash: CC41FA746087009FD704EF69C08169ABBE0BF88348F54C96FE889DB321E778D845CB4A
                                  APIs
                                  Strings
                                  • cannot use namespace qualifiers in hidden command token (rename), xrefs: 0044430B
                                  • hidden command named ", xrefs: 0044433F
                                  • can only hide global namespace commands (use rename then hide), xrefs: 00444392
                                  • " already exists, xrefs: 0044432F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strstr
                                  • String ID: " already exists$can only hide global namespace commands (use rename then hide)$cannot use namespace qualifiers in hidden command token (rename)$hidden command named "
                                  • API String ID: 1392478783-3291292050
                                  • Opcode ID: 85b3d2eed276cc21cc35d3eba946e3027fe9579109ec7e4255d67c8a407ab487
                                  • Instruction ID: 50315f9483b92a73608e8a9cc724a16a67b999e0e0cac21ee5296f45d4229adb
                                  • Opcode Fuzzy Hash: 85b3d2eed276cc21cc35d3eba946e3027fe9579109ec7e4255d67c8a407ab487
                                  • Instruction Fuzzy Hash: 7E41E2B06083019BE710DF29D08476BFBE0BFC4748F54892EE8998B745D778D8859B86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: get: $%d %d %d$coordinates out of range$x y
                                  • API String ID: 0-3454057883
                                  • Opcode ID: 569fb8a0a24f69831a539cbb189ce02c658a1015e690dfd101c6a40511807038
                                  • Instruction ID: 64bebaca35e064e35558ed68be7640b82890a089d75ea1ec53c57848ddc779e9
                                  • Opcode Fuzzy Hash: 569fb8a0a24f69831a539cbb189ce02c658a1015e690dfd101c6a40511807038
                                  • Instruction Fuzzy Hash: 7831B175608341DFD324DF19C488A5ABBE1BB89305F15C96EE9D88B326D338D944DF42
                                  APIs
                                    • Part of subcall function 0044EFA8: EnterCriticalSection.KERNEL32(?,?,00000000,?,0046CEA7,?,?,?,?,00000000,?,0046D2F4), ref: 0044EFBA
                                  • sprintf.MSVCRT ref: 0046D72C
                                  • sprintf.MSVCRT ref: 0046D784
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf$CriticalEnterSection
                                  • String ID: %lu %ld %ld %ld %ld %ld %ld$shared$thread%p
                                  • API String ID: 2213532840-1216579774
                                  • Opcode ID: e1fc49fcb74e8642aa308dde3f0263dbb9ab1a0b1f3a7293d56f2d8de71f22be
                                  • Instruction ID: 0d5943e8d46ec93c6713fdf45dee9e5b677d6c49d736676b3898772922882764
                                  • Opcode Fuzzy Hash: e1fc49fcb74e8642aa308dde3f0263dbb9ab1a0b1f3a7293d56f2d8de71f22be
                                  • Instruction Fuzzy Hash: 6931AEB89097019FC744EF2AD48456EBBF0BF89304F11991EF8988B312D338D9499B87
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$MetricsReleaseText
                                  • String ID:
                                  • API String ID: 594571999-0
                                  • Opcode ID: 9ec49f628d3770be450a3752f59478e46f1371ed90270ddaf8779c9d7216ce31
                                  • Instruction ID: f54a2017017d532bd8de60f854d70709a7b9f419ee776f61cee5196ab01de520
                                  • Opcode Fuzzy Hash: 9ec49f628d3770be450a3752f59478e46f1371ed90270ddaf8779c9d7216ce31
                                  • Instruction Fuzzy Hash: 5621CEB69087419FC710EF39C58965AFFE0BF89710F05892EE888C7315E634EA55CB52
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: memcmp
                                  • String ID: $$stderr$stdin$stdout
                                  • API String ID: 1475443563-2767095220
                                  • Opcode ID: 3f90df3ac0f5dd647a0a687d463cd73a79af2b2fbb95b971885ca92401db3ce3
                                  • Instruction ID: 5825fcc97d314ff7968f2031c73c9fa489f1e98c3389a733d60a9efeac545281
                                  • Opcode Fuzzy Hash: 3f90df3ac0f5dd647a0a687d463cd73a79af2b2fbb95b971885ca92401db3ce3
                                  • Instruction Fuzzy Hash: 831126716092849FCB10EF29948151B7BE4FB89310F14A96AF9D8CB301D2B9DC41C796
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CloseHandle$MessageObjectPostSingleWait
                                  • String ID:
                                  • API String ID: 1204663691-0
                                  • Opcode ID: 41f0cc64a660129be812c470555b3320c4586d68412d5e74cb0b2e9ce9b3100a
                                  • Instruction ID: ed71042f3d27938f6c23a7851559aa441d76d15aa2619143e98ef777272f164c
                                  • Opcode Fuzzy Hash: 41f0cc64a660129be812c470555b3320c4586d68412d5e74cb0b2e9ce9b3100a
                                  • Instruction Fuzzy Hash: C31192F05083059BDB10AF29C58972ABBE8BF81314F05C95DE9D88B286E779C8449B96
                                  APIs
                                    • Part of subcall function 0044EFA8: EnterCriticalSection.KERNEL32(?,?,00000000,?,0046CEA7,?,?,?,?,00000000,?,0046D2F4), ref: 0044EFBA
                                  • getenv.MSVCRT ref: 004AD75C
                                  • strcmp.MSVCRT ref: 004AD777
                                  • _tzset.MSVCRT ref: 004AD780
                                  • strcpy.MSVCRT ref: 004AD7B7
                                  • _tzset.MSVCRT ref: 004AD7DA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _tzset$CriticalEnterSectiongetenvstrcmpstrcpy
                                  • String ID:
                                  • API String ID: 2340223471-0
                                  • Opcode ID: fd0f026db120bb50194a7ec84b9f2f6672821a38942962a11daa44717260a48f
                                  • Instruction ID: 137c37ff5cd1948b41cc3d07ba464c0dd47dfb00cb8f942c64c6baa3dc1b91ca
                                  • Opcode Fuzzy Hash: fd0f026db120bb50194a7ec84b9f2f6672821a38942962a11daa44717260a48f
                                  • Instruction Fuzzy Hash: A7115EB46052418ADB18BF7E958512FBFE0BFE1300F01582EA8C68B241DB38C4459B16
                                  APIs
                                  Strings
                                  • missing close-brace for variable name, xrefs: 004B47B5
                                  • missing ), xrefs: 004B4861
                                  • max # of tokens for a Tcl parse (%d) exceeded, xrefs: 004B4636
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _isctype
                                  • String ID: max # of tokens for a Tcl parse (%d) exceeded$missing )$missing close-brace for variable name
                                  • API String ID: 162844146-3094105281
                                  • Opcode ID: ffd3e812be72b7eb59e787333822c308bf61e7ab74bf7908e95ff7ce46502046
                                  • Instruction ID: 1758d945354597e8285d8c093b6fcc0c96794446486f252be533afea98ca80d2
                                  • Opcode Fuzzy Hash: ffd3e812be72b7eb59e787333822c308bf61e7ab74bf7908e95ff7ce46502046
                                  • Instruction Fuzzy Hash: DFD1A0B45083458FDB14DF29C0846ABBBE0BFC4354F154A6EE8888B352D778E945CBA6
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmpstrpbrk
                                  • String ID: *[?\$?pattern?
                                  • API String ID: 2613077465-2288588395
                                  • Opcode ID: d1bc52e7ba841f65f8119309759369fd1a56ad08d37cb7a914c61d48d7b719fa
                                  • Instruction ID: 909a5c03e068af886f9ee94207d3cc8aeaea9192a78567cad3d083901c1b90f0
                                  • Opcode Fuzzy Hash: d1bc52e7ba841f65f8119309759369fd1a56ad08d37cb7a914c61d48d7b719fa
                                  • Instruction Fuzzy Hash: 6CD1E6706093019FD750DF29C18472BBBE0AFC4759F15882EF9988B352E738D889DB4A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strtol
                                  • String ID:
                                  • API String ID: 76114499-3916222277
                                  • Opcode ID: 40a515e1d1175c06cdf0c054c44403577ad73acbe49dd18fbe3bcad1fe8cec4c
                                  • Instruction ID: fee7f8da2be7a24757995582e0a1b28b83ae8c5cad812d0faaa68ba84f5ddaf6
                                  • Opcode Fuzzy Hash: 40a515e1d1175c06cdf0c054c44403577ad73acbe49dd18fbe3bcad1fe8cec4c
                                  • Instruction Fuzzy Hash: 67A1AD74B083418FDB169F25C08472ABBF4AF95740F15C86DE8858B649EB75EC84CB86
                                  Strings
                                  • Defocussed implicit Async, xrefs: 00384CB6
                                  • Focussed implicitly on %s, xrefs: 00384CDA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Defocussed implicit Async$Focussed implicitly on %s
                                  • API String ID: 0-3614253387
                                  • Opcode ID: 8c00c142a1b0b856083ad7d6b39312fe99ad6057cc3c6470ed7c87ca74a8df6d
                                  • Instruction ID: 02c5485e23067242c76b7ce8fc9f29f89056efc3c5aab471a863821b250542c9
                                  • Opcode Fuzzy Hash: 8c00c142a1b0b856083ad7d6b39312fe99ad6057cc3c6470ed7c87ca74a8df6d
                                  • Instruction Fuzzy Hash: E28128706043028FC71AEF28D18475ABBE5BF45305F1A899EE8488FB12D339EC85CB85
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmpstrpbrk
                                  • String ID: *[?\$?pattern?
                                  • API String ID: 2613077465-2288588395
                                  • Opcode ID: f3167ab9653d0e1bc4c3257eb6e4ddd80e6a781c2da2cc9d74b7049f0be85472
                                  • Instruction ID: ed9d31156ef39e5346f47fc907d213511054f833d37519b519c030fd9e738b51
                                  • Opcode Fuzzy Hash: f3167ab9653d0e1bc4c3257eb6e4ddd80e6a781c2da2cc9d74b7049f0be85472
                                  • Instruction Fuzzy Hash: F18101B46097418FD710EF26C58062FBBE4AF99758F05892EF8D887361E738D841CB4A
                                  APIs
                                  Strings
                                  • couldn't unlink window in TkWmDeadWindow, xrefs: 0037CA64
                                  • numTransients should be 0, xrefs: 0037CA78
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: couldn't unlink window in TkWmDeadWindow$numTransients should be 0
                                  • API String ID: 3850602802-1239855352
                                  • Opcode ID: 98645268e169725e9277f2b3ff26d4425431e97ac3d259cad21fcbbd0887f5fb
                                  • Instruction ID: 099e20d85842646783331225356bbdc84f19c4d829b84936e13e1c160176de39
                                  • Opcode Fuzzy Hash: 98645268e169725e9277f2b3ff26d4425431e97ac3d259cad21fcbbd0887f5fb
                                  • Instruction Fuzzy Hash: AA911370614601CFEB65DF28C4C4B6ABBE4BF14301F16D9ADE89D8B256D738E840DB51
                                  APIs
                                  Strings
                                  • -compare command returned non-integer result, xrefs: 004A1B8F
                                  • (-compare command), xrefs: 004A1AB0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmp
                                  • String ID: (-compare command)$-compare command returned non-integer result
                                  • API String ID: 1004003707-2902590225
                                  • Opcode ID: aaac74689d5699153f9d5378c80f0e64d5382dcee999f309268be9d032f51b6a
                                  • Instruction ID: 4d68514c33459d77f7448a08b0283ba2af83f176d37a986610a99847936ac8a3
                                  • Opcode Fuzzy Hash: aaac74689d5699153f9d5378c80f0e64d5382dcee999f309268be9d032f51b6a
                                  • Instruction Fuzzy Hash: 2E6107B46097019FC704DF29C18495ABBE1BFCA344F65C99EE8898B325E738D846CF46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSendstrcpy
                                  • String ID: @uT$window ?newTitle?
                                  • API String ID: 417745432-1632639453
                                  • Opcode ID: 9fc36ca9dfb388c89a7a2dceca8f3803809c9af5be644f9595b34c79feba6915
                                  • Instruction ID: 0ac9d7a50564372488a2adb1e9a92ce8cf46253a3eca3955102b6a9705989e3b
                                  • Opcode Fuzzy Hash: 9fc36ca9dfb388c89a7a2dceca8f3803809c9af5be644f9595b34c79feba6915
                                  • Instruction Fuzzy Hash: 7951F775608305CFD315DF28D888A5ABBE4FF88315F158A6EE89CCB261D774D884DB42
                                  APIs
                                  Strings
                                  • " but got ", xrefs: 0039C098
                                  • expected integer argument for ", xrefs: 0039C0AA
                                  • " option requires an additional argument, xrefs: 0039C490
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strtol
                                  • String ID: " but got "$" option requires an additional argument$expected integer argument for "
                                  • API String ID: 76114499-604356923
                                  • Opcode ID: 8a730aee1ce20ae2063d3da203ebe931a265284282ca905069c6292c95965147
                                  • Instruction ID: d80ed185db28ac2ecdc0c7ec18f9b3d6ed52c1c59260dac8431c581c0bf2121c
                                  • Opcode Fuzzy Hash: 8a730aee1ce20ae2063d3da203ebe931a265284282ca905069c6292c95965147
                                  • Instruction Fuzzy Hash: 6641AB74208342CFD720CF18C584A5ABBF1FBCA344F54896DE9898B325D732E889CB52
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: __p__environ$strchr
                                  • String ID: =
                                  • API String ID: 3615923317-2322244508
                                  • Opcode ID: 40592431ca9df931ead1a6bbe34d80ad50fca33239a222d88316b42128212343
                                  • Instruction ID: 1e8b93fb74f5326cafd64f463a05b499eb5aad9bbc1b4f782291e694d9bde7fd
                                  • Opcode Fuzzy Hash: 40592431ca9df931ead1a6bbe34d80ad50fca33239a222d88316b42128212343
                                  • Instruction Fuzzy Hash: 2D314B70608341CFD710BF3A848066EBBE5AF8A355F55496EECD88B392D7388849CB46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Versionsprintf
                                  • String ID: Win32$Windows %d.%d %d %s
                                  • API String ID: 1728264858-2344931379
                                  • Opcode ID: ce15d56820fcf86f5e017424b1fbe92542e1bf64bed2cb3d6c06df8986fef4dd
                                  • Instruction ID: 45615ae681d55f1a744ea5eb3806cd48db3015884b473caf309162aeb053281d
                                  • Opcode Fuzzy Hash: ce15d56820fcf86f5e017424b1fbe92542e1bf64bed2cb3d6c06df8986fef4dd
                                  • Instruction Fuzzy Hash: D3F0A7B04483419FC350EF68D088A5EBBE4BB88384F00882DF8E887351E7789988DF03
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: __deregister_frame_info$libgcc_s_dw2-1.dll
                                  • API String ID: 1646373207-2468945734
                                  • Opcode ID: 5f12decdcc5d9b743a32e1d3d408d8f6e07f589e034eed3ff5b91223661be4b9
                                  • Instruction ID: 77c6256fd4a7b221a8830370ec22462204e0a149ffda22fd37cb37a56f7ac1eb
                                  • Opcode Fuzzy Hash: 5f12decdcc5d9b743a32e1d3d408d8f6e07f589e034eed3ff5b91223661be4b9
                                  • Instruction Fuzzy Hash: EBE012A451830186DB013BB9492A12EBEE87A81345F59491D98C2A6B95EBB4D40897A3
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmp
                                  • String ID: -menu$index ?option value ...?$normal
                                  • API String ID: 1004003707-522286960
                                  • Opcode ID: ece9d09a309ce7bd3fe74ade5e4005bbf6a6ebc5be36ebeb61c97730a646e4e8
                                  • Instruction ID: 832831ec838f9627511cc85d94a244881d97a650e9708f59dddec21696fcf315
                                  • Opcode Fuzzy Hash: ece9d09a309ce7bd3fe74ade5e4005bbf6a6ebc5be36ebeb61c97730a646e4e8
                                  • Instruction Fuzzy Hash: 1EE1BF74608741CFDB61DF29C48472ABBE4BF89351F11896EE899CB361EB70E845CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcpy
                                  • String ID: (processing -height option)$ (processing -width option)$a
                                  • API String ID: 3177657795-2829466702
                                  • Opcode ID: fbbcfcfdbd608490670083a1120157ecb9baf5d9be1281860549ed0af227cf40
                                  • Instruction ID: c8768e9a5a4c59d411f7162ad6142684417f7ded08709e206690d3b7d9f9249a
                                  • Opcode Fuzzy Hash: fbbcfcfdbd608490670083a1120157ecb9baf5d9be1281860549ed0af227cf40
                                  • Instruction Fuzzy Hash: 5FC1C0B46087019FD361DF29D484B9ABBE4BF88744F11892EE6D9CB751E770E844CB42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ldexp
                                  • String ID:
                                  • API String ID: 3613099532-0
                                  • Opcode ID: 1eda9e8d3d15cf2e77b62c135615949321145c8da2ff348ee15287f910f4cdf3
                                  • Instruction ID: 021824e5dfae40275b1968d9c808682a6a0398761cff1ff920b861875e62aaa1
                                  • Opcode Fuzzy Hash: 1eda9e8d3d15cf2e77b62c135615949321145c8da2ff348ee15287f910f4cdf3
                                  • Instruction Fuzzy Hash: 45A123749087459BCB50AF2AC08461BBBE0FFC8394F51892EF8C987351E739D851CB8A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmpstrcpy
                                  • String ID: as label in this frame$can't use
                                  • API String ID: 1519103487-580465556
                                  • Opcode ID: 929ddeb7bd599cd59c9a33c70f61d5fd9a5a9b6d5eadd91646a308982ea2236e
                                  • Instruction ID: e54066742909c00f111e3d58b87480aac1e594b4fbca2fe15f8ba5da18b6d55d
                                  • Opcode Fuzzy Hash: 929ddeb7bd599cd59c9a33c70f61d5fd9a5a9b6d5eadd91646a308982ea2236e
                                  • Instruction Fuzzy Hash: 569137B46087018FDB12DF29D1C672ABBE0BF89714F16896DE8888B355D774D885CF82
                                  APIs
                                  Strings
                                  • -displaychars, xrefs: 003C717B
                                  • ?-displaychars? ?--? index1 ?index2 ...?, xrefs: 003C6E32
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strcmpstrncmp
                                  • String ID: -displaychars$?-displaychars? ?--? index1 ?index2 ...?
                                  • API String ID: 1845225520-515860422
                                  • Opcode ID: 2c2d32ed2bbf2e6a69825557eac74d2250e25dbc21729e901ba29dbccab85a40
                                  • Instruction ID: a8854fa7a624d1fdede3068fda38bd14c1fc0a8941480541c9bc1c6edaf5528c
                                  • Opcode Fuzzy Hash: 2c2d32ed2bbf2e6a69825557eac74d2250e25dbc21729e901ba29dbccab85a40
                                  • Instruction Fuzzy Hash: F081CEB0508740CFD765DF29C488B6ABBE4AF99311F15886EE989CB321D771EC84DB42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: _isctype
                                  • String ID:
                                  • API String ID: 162844146-0
                                  • Opcode ID: 8b5b773b5a9108efc0e8b5de0997a02ece56569774e98a9665d4cddafcb5751c
                                  • Instruction ID: 066ef5be4faa00fc28438041bc324134fe36d1023f956c9f7d5f8b94313c5267
                                  • Opcode Fuzzy Hash: 8b5b773b5a9108efc0e8b5de0997a02ece56569774e98a9665d4cddafcb5751c
                                  • Instruction Fuzzy Hash: 6561F1381043528FC7268F2AC484239BBE4FF89705F69866DE8D48B3A9DF35D845DB41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (processing "%.40s" option)$" missing$value for "
                                  • API String ID: 0-431595676
                                  • Opcode ID: 5aeb493d749e0d4b64fd0cf2371bad4cf099ed99eaae7091f9bf5fa19be95dd8
                                  • Instruction ID: c34079ef6983d495d49908b8d2f1cac7574b85d64546c26ea665233684632acc
                                  • Opcode Fuzzy Hash: 5aeb493d749e0d4b64fd0cf2371bad4cf099ed99eaae7091f9bf5fa19be95dd8
                                  • Instruction Fuzzy Hash: 9B61E775609390CFE721DF59D484BAAB7E4BF88300F168A6DE98C9B391D730D844CB92
                                  Strings
                                  • invalid export pattern ", xrefs: 0048CB7C
                                  • ": pattern can't specify a namespace, xrefs: 0048CB70
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ": pattern can't specify a namespace$invalid export pattern "
                                  • API String ID: 0-1551883341
                                  • Opcode ID: c484349cce28b90f4578b83e64f520b20a8c0cfcf49131f534b54ddef2506f2b
                                  • Instruction ID: deb40eefd36b6b48c7e16a444921c5e64690466376c2087bbcb658269d4aff67
                                  • Opcode Fuzzy Hash: c484349cce28b90f4578b83e64f520b20a8c0cfcf49131f534b54ddef2506f2b
                                  • Instruction Fuzzy Hash: 8D51F2756087458FD720EF65D4807AFBBE0FB88344F14892EE8899B301E778E945CB66
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: strncmp
                                  • String ID: ambiguous smooth method "$bezier$smoothMethod
                                  • API String ID: 1114863663-1795201744
                                  • Opcode ID: 24547e94ce4f7e740b07e87b69168b47f22dcafbd861cf219b2516480f545f59
                                  • Instruction ID: 4e89ad10b77bbf1c1e0ab9d7eb5e686bc65f2223aca851b56adc346de5b6cb15
                                  • Opcode Fuzzy Hash: 24547e94ce4f7e740b07e87b69168b47f22dcafbd861cf219b2516480f545f59
                                  • Instruction Fuzzy Hash: B54159B2608305CFD7119F69E58062ABBE4FB84754F15896FE988CB350DB70EC418B42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Rect$CombineCreateDeleteObject
                                  • String ID:
                                  • API String ID: 1043552210-0
                                  • Opcode ID: 8d52600c41edfee5191a916c84993cc7ce4a031359026395fd61d190d756d9a5
                                  • Instruction ID: 33fcd9d13e808c0ba221bd75a2c65ae56abdfb2fedda8c75254690d142ffe86e
                                  • Opcode Fuzzy Hash: 8d52600c41edfee5191a916c84993cc7ce4a031359026395fd61d190d756d9a5
                                  • Instruction Fuzzy Hash: 9631F2B250C7418BC705EF69D48062EFBE0BBC9354F158E2EE8C997351D7B49944CB46
                                  APIs
                                  • SendMessageA.USER32 ref: 0047422D
                                  • send.WS2_32 ref: 0047424F
                                  • WSAGetLastError.WS2_32 ref: 0047425E
                                    • Part of subcall function 00474100: SendMessageA.USER32 ref: 00474144
                                    • Part of subcall function 00474100: SendMessageA.USER32 ref: 00474165
                                  • SendMessageA.USER32 ref: 004742A9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: MessageSend$ErrorLastsend
                                  • String ID:
                                  • API String ID: 1292614938-0
                                  • Opcode ID: 7fd93bd7a678b48e6aee5e9f038e10f1fb7d993ca12dfa1dd8872396e5150f9e
                                  • Instruction ID: 6d1f16e0c1a62264b547a139a7292c136b5f92d316e609c50a985e310411777c
                                  • Opcode Fuzzy Hash: 7fd93bd7a678b48e6aee5e9f038e10f1fb7d993ca12dfa1dd8872396e5150f9e
                                  • Instruction Fuzzy Hash: 76313A705083018BD700AF65D48936BBFE0AF85364F10C95EFDA88B382E779D855CB96
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: abortfflushfprintffputc
                                  • String ID:
                                  • API String ID: 3851330464-0
                                  • Opcode ID: b11438234d12d0f0ad1271df92bfb6448d31a10888429a89d29e10a22211cccf
                                  • Instruction ID: 9232b92555d70798292a8e2bad40f5b585b7e0e33e1ff4fa26422e458d96f398
                                  • Opcode Fuzzy Hash: b11438234d12d0f0ad1271df92bfb6448d31a10888429a89d29e10a22211cccf
                                  • Instruction Fuzzy Hash: 1E3164B49093419FC344EF2AD48480AFBE4BFC8750F55896EE89887322E374E9458F92
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: sprintf
                                  • String ID: (changing screen in event binding)$.%d$tk::ScreenChanged
                                  • API String ID: 590974362-2660851226
                                  • Opcode ID: 02b21a27becb8d5e14dced3fca56d716b93be740de43dbebf5ff460ff1e66d89
                                  • Instruction ID: dece007eb368ce2166bead3b07070ac09aed04285368b6ce8e5fe73adaca3988
                                  • Opcode Fuzzy Hash: 02b21a27becb8d5e14dced3fca56d716b93be740de43dbebf5ff460ff1e66d89
                                  • Instruction Fuzzy Hash: F621C671108751DFD300AF29D88899ABBE4FF88715F158A6EF8D88B361C7709848DF42
                                  APIs
                                    • Part of subcall function 00474644: socket.WS2_32 ref: 004746DF
                                    • Part of subcall function 00474644: SetHandleInformation.KERNEL32 ref: 00474705
                                    • Part of subcall function 00474644: bind.WS2_32 ref: 00474748
                                    • Part of subcall function 00474644: connect.WS2_32 ref: 00474776
                                    • Part of subcall function 00474644: ioctlsocket.WS2_32 ref: 004747A8
                                    • Part of subcall function 00474644: SendMessageA.USER32 ref: 004747C9
                                  • sprintf.MSVCRT ref: 004751AE
                                    • Part of subcall function 00436D94: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,0046F864), ref: 00436E0A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: HandleInformationMessageSendbindconnectioctlsocketsocketsprintfstrcpy
                                  • String ID: -eofchar$FWX$sock%u
                                  • API String ID: 566417593-3712499716
                                  • Opcode ID: 830ebceadffb8b522db6f48c8dab90400f53ca56b6813c74cb211f1bef95523c
                                  • Instruction ID: 9f626d1c43ce551074f78611b03c87b5636d9cf7601dfe8290dae87419b31b27
                                  • Opcode Fuzzy Hash: 830ebceadffb8b522db6f48c8dab90400f53ca56b6813c74cb211f1bef95523c
                                  • Instruction Fuzzy Hash: BA21CEB06087019FD740EF6AD48575EFBE0BB88354F00C81EE8888B345E3B89884CB87
                                  APIs
                                  • GetModuleFileNameW.KERNEL32 ref: 004D7C2F
                                  • WideCharToMultiByte.KERNEL32 ref: 004D7C79
                                  • GetModuleFileNameA.KERNEL32 ref: 004D7CCE
                                  • MultiByteToWideChar.KERNEL32 ref: 004D7CFD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: ByteCharFileModuleMultiNameWide
                                  • String ID:
                                  • API String ID: 1532159127-0
                                  • Opcode ID: af3dfad8e039e74d99652ce875b2da8b5053a0cf9be8f6c777cf6ca540541c38
                                  • Instruction ID: 469a878aa9c2862a52d748c4df00622312c66ccacf3d113b22f7d4339999fe8c
                                  • Opcode Fuzzy Hash: af3dfad8e039e74d99652ce875b2da8b5053a0cf9be8f6c777cf6ca540541c38
                                  • Instruction Fuzzy Hash: 3821C6B04193429BD310FF25D59935EBFE4BF84754F008A1EE8E846281D3789588CB97
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterEventLeaveMessagePost
                                  • String ID:
                                  • API String ID: 1965291419-0
                                  • Opcode ID: 115d096e94e628b68e7244910ecf646ca579b82f193d9443a5d20b0f1fa6dd29
                                  • Instruction ID: cdf4e61a1a4d9f670fa0564af498c11986a45474f92e4d288fe7ddf2e3593863
                                  • Opcode Fuzzy Hash: 115d096e94e628b68e7244910ecf646ca579b82f193d9443a5d20b0f1fa6dd29
                                  • Instruction Fuzzy Hash: 4AF0F9F05043058BDB00BF64C9C975A7BE8BB84304F55894CECC85B306D379D8548B82
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CountMessagePeekTick
                                  • String ID:
                                  • API String ID: 3670886068-0
                                  • Opcode ID: ccb6cd32488bca824a4161bcb810f695b4977f633fc96139772cc501ef4f718b
                                  • Instruction ID: d30cc8f9c2fdc19ce17ebbf5a1c7a1f6eb1aa8e5fb045bf8536d8ef7195eff4e
                                  • Opcode Fuzzy Hash: ccb6cd32488bca824a4161bcb810f695b4977f633fc96139772cc501ef4f718b
                                  • Instruction Fuzzy Hash: 0BF049F14083079ED310BF60D44E35BBFE0BB80388F01892CE8D50A647E3B98A498B93
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *[?\$-nocase
                                  • API String ID: 0-2085894175
                                  • Opcode ID: a491c48a6358f61a1d4ca52f678f2aed1518afd793cb0e98ac746a6bdb5fd9b5
                                  • Instruction ID: 940e9b87f57893c47fc933fff6a0567715fa77a26346cc8f2d967b89d0471451
                                  • Opcode Fuzzy Hash: a491c48a6358f61a1d4ca52f678f2aed1518afd793cb0e98ac746a6bdb5fd9b5
                                  • Instruction Fuzzy Hash: CEC119746087418FDB88CF29C080B5EBBE1BB98344F54866EE8899B355D738E981CF56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: B$unexpected fallthrough
                                  • API String ID: 0-2883051789
                                  • Opcode ID: 785322b4db57cf452b1f1139ddbbff2beb598b93542547ab3ff5fb4a2aa671a1
                                  • Instruction ID: 6b97ee26d52e7f5907e11f6416a81aa74c599233bae89af01edb228d78dd219f
                                  • Opcode Fuzzy Hash: 785322b4db57cf452b1f1139ddbbff2beb598b93542547ab3ff5fb4a2aa671a1
                                  • Instruction Fuzzy Hash: B0A17C745487418FE724CF28C18026FB7E2BF85354F284A2EE99587391D339EC56CB46
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Timer
                                  • String ID: 0
                                  • API String ID: 2870079774-4108050209
                                  • Opcode ID: 6b96576a4529a1cb7a418e8987b29385aae190992c837b0bf503d096e2bfeade
                                  • Instruction ID: f7f627ec686f2391271756ab4fbbdd6ff47c933ff3a2b69405dc966cccc6a84f
                                  • Opcode Fuzzy Hash: 6b96576a4529a1cb7a418e8987b29385aae190992c837b0bf503d096e2bfeade
                                  • Instruction Fuzzy Hash: ED217CB26043058FC310DF29D5C476BBBE4EB89318F10856ED4888B351E776E949CF86
                                  APIs
                                  • GetMessagePos.USER32 ref: 003E487C
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1F5F
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1F72
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1F88
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1F9E
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1FB2
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1FC6
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1FDA
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1FEC
                                    • Part of subcall function 003E1F54: GetKeyState.USER32 ref: 003E1FFE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: State$Message
                                  • String ID: #$MenuSelect
                                  • API String ID: 2099557750-3642914969
                                  • Opcode ID: b4f90cb495f1e1a50785fa4ecb8b2e35e5f5ef3b52fa0d489b1f27c53f68a363
                                  • Instruction ID: fb6d94a2816fef3ffb4838cda42851fd4e5649525d5041445762546ffbbde6f5
                                  • Opcode Fuzzy Hash: b4f90cb495f1e1a50785fa4ecb8b2e35e5f5ef3b52fa0d489b1f27c53f68a363
                                  • Instruction Fuzzy Hash: A011AFB48097408FD750EF69D08970ABBF0BF89344F00896DE0988B352E779D949CF92
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CharsetInfoTranslatewsprintf
                                  • String ID: cp%d
                                  • API String ID: 2158003821-4262107655
                                  • Opcode ID: 633a3c94f182f8ca66e2405188cf7c472d5385830d5513ccfe1d974bb947e551
                                  • Instruction ID: 11b879d2da6fe4c4ad857c5aa722529154c298292534202f7bccc5452dab2ae5
                                  • Opcode Fuzzy Hash: 633a3c94f182f8ca66e2405188cf7c472d5385830d5513ccfe1d974bb947e551
                                  • Instruction Fuzzy Hash: 95111EB49083118FD710EF24E98464BBBE4FB98700F05892DE9898B314E335D846DB82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: 0$TclNotifier
                                  • API String ID: 716092398-3781708277
                                  • Opcode ID: 9f78c5cadc39e5011b7bdb157b2572e524bf52cad04cdbe306345e50daf6f046
                                  • Instruction ID: 6b3f68f41d3de01485ad4339163f0f1bf605487e10b2491bceaad76e93f29d36
                                  • Opcode Fuzzy Hash: 9f78c5cadc39e5011b7bdb157b2572e524bf52cad04cdbe306345e50daf6f046
                                  • Instruction Fuzzy Hash: 960104B140A3018FE700EF15C59931BBFE4BB84748F008A1EE4D80B250E3BA8A09CBC7
                                  APIs
                                  Strings
                                  • VirtualQuery failed for %d bytes at address %p, xrefs: 00534BB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: Virtual$Protectmemcpy$Query
                                  • String ID: VirtualQuery failed for %d bytes at address %p
                                  • API String ID: 228986436-2206166143
                                  • Opcode ID: ced5420f7a26f5786468fdadceaa18b194a2a2194b211a046a9f0fdba5e0893c
                                  • Instruction ID: 56130ccbe6ee432153c749cf04f2f088592ba3b98b45e5b650d919b8cfe52699
                                  • Opcode Fuzzy Hash: ced5420f7a26f5786468fdadceaa18b194a2a2194b211a046a9f0fdba5e0893c
                                  • Instruction Fuzzy Hash: 6401AEB09083418BD700AF59D28160AFFE4BFC8B44F85882EE9D887311D7B5E8449F47
                                  APIs
                                    • Part of subcall function 0044EFA8: EnterCriticalSection.KERNEL32(?,?,00000000,?,0046CEA7,?,?,?,?,00000000,?,0046D2F4), ref: 0044EFBA
                                    • Part of subcall function 00474918: PostMessageA.USER32 ref: 0047495A
                                    • Part of subcall function 00474918: WaitForSingleObject.KERNEL32 ref: 00474970
                                    • Part of subcall function 00474918: CloseHandle.KERNEL32 ref: 00474984
                                    • Part of subcall function 00474918: CloseHandle.KERNEL32(00000000), ref: 0047499B
                                    • Part of subcall function 00474918: CloseHandle.KERNEL32 ref: 004749B2
                                  • UnregisterClassA.USER32 ref: 00474D94
                                  • WSACleanup.WS2_32 ref: 00474D9C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2933452323.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                  • Associated: 00000000.00000002.2933372870.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934218254.0000000000543000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934244771.0000000000544000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934268157.0000000000545000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934305918.0000000000547000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934333234.0000000000549000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934359937.000000000054F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934387311.0000000000550000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934410357.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934434659.0000000000558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934507210.00000000005EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934533254.00000000005ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934558491.00000000005EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934584546.00000000005F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2934645864.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_360000_microPHAZIR_5.jbxd
                                  Similarity
                                  • API ID: CloseHandle$ClassCleanupCriticalEnterMessageObjectPostSectionSingleUnregisterWait
                                  • String ID: TclSocket
                                  • API String ID: 1843813663-1749961011
                                  • Opcode ID: 5b35703538853d58bf49376b6ef00d821f86f58ceba1ece078f1d6a535828579
                                  • Instruction ID: 0f64abdcd620b6277e819f1671a766f4015ba6e361a518cec4eb4642c9151621
                                  • Opcode Fuzzy Hash: 5b35703538853d58bf49376b6ef00d821f86f58ceba1ece078f1d6a535828579
                                  • Instruction Fuzzy Hash: 11D012B14042808ADB04BF6E400731D7EE07BC4308F51C92EA8C40A503E77842599B7B